Search Results - (( java implementation some algorithm ) OR ( rate detection using algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- using algorithm »
- some algorithm »
- rate detection »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Machine learning algorithms in context of intrusion detection
Published 2016“…The result shows that not a single algorithm has a high detection rate for each class of KDD99 dataset. …”
Get full text
Get full text
Conference or Workshop Item -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…Then, the percentage of detection accuracy was used to compare the detection performance of all five algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
13
Improving intrusion detection using genetic algorithm
Published 2013“…The experimental results demonstrate that the proposed approach outperforms the existing techniques, with the detection rate of attack and false alarm rates of 95.7265 and 4.2735, respectively. …”
Get full text
Get full text
Get full text
Article -
14
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…Besides that, a comparison is made with Cumulative Sum, Exponentially-weighted Moving Average, and Multi Layer Perceptron.From the experiment, the best parameter setting for anthrax outbreak using dendrite cell algorithm is identified whereby it proven can helps the model to produce a good detection result between detection rate and false alarm rate.Since each outbreak disease carries different outbreak characteristic, the parameter setting for different outbreak might be different.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Object detection system using haar-classifier
Published 2009“…Object detection system using Haar-classifier algorithm can perform best performance of high detection rate and high level of accuracy rate.…”
Get full text
Get full text
Undergraduates Project Papers -
16
A new approach to highway lane detection by using hough transform technique
Published 2017“…In the final achievement analysis, the test result shows a true positive rate, a TP lane detection average rate of 0.925 and the capability to be used in the final application implementation.…”
Get full text
Get full text
Get full text
Article -
17
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…In order to measure the evaluation, several performance metrics, such as frequency of convergence of the detection scheme, accuracy of detection, false alarm rate, defence rate and energy consumption, are addressed as part of detection and prevention scheme. …”
Get full text
Get full text
Thesis -
19
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item
