Search Results - (( java implementation search algorithm ) OR ( pattern detection system algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  10. 10

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Evaluation of fall detection classification approaches by Kerdegari, Hamideh, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Ghotoorlar, Saeid Mokaram

    Published 2012
    “…An accurate automatic fall detection system can help elderly people be safe in every situation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16
  17. 17

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
    Get full text
    Get full text
    Article
  18. 18

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  19. 19

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Therefore, there is a strong need to automate this process. Such automated systems must rely on robust and effective algorithms for detection and prediction. …”
    Get full text
    Article
  20. 20

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis