Search Results - (( java implication tree algorithm ) OR ( data detection new algorithm ))

Refine Results
  1. 1

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Fault detection with optimum March test algorithm by Zakaria, Nor Azura, Wan Hassan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Xiao, Qing Wen

    Published 2013
    “…The automation hardware was designed to give the flexibility to the user to generate other new March Algorithm prior to the selected algorithm and analyzed the performance in terms of fault detection and power consumption.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic detection of lineaments from LANDSAT images in United Arab Emirate (UAE) by Marghany , Maged, El Mahdi, Samy Ismail, Hashim, Mazlan

    Published 2006
    “…Lineament identifications from remotely sensed data are required standard procedures. This work utilized a new geomatical tool for lineament identification which based on automatic detection algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Generation of new low-complexity March algorithms for optimum faults detection in SRAM by Jidin, Aiman Zakwan, Hussin, Razaidi, Lee, Weng Fook, Mispan, Mohd Syafiq, Zakaria, Nor Azura, Loh, Wan Ying, Zamin, Norshuhani

    Published 2023
    “…It was achieved by developing automated software to generate the new Data Background sequence and rearrange the existing March algorithms’ test operations to remove redundancies and enable the sensitization and detection of the intended faults while preserving their complexities. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…Focus will be given to research that have produced new intrusion detection algorithms, framework and model as well as their gaps in the research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…Therefore, an action must be taken to detect and solve this problem. A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    An improved artificial dendrite cell algorithm for abnormal signal detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network by SALLIM, JAMALUDIN

    Published 2017
    “…Ant colony optimization (ACO) is a metaheuristic algorithm that has been successfully applied to several types of optimization problems such as scheduling, routing, and more recently for solving protein functional module detection (PFMD) problem in protein-protein interaction (PPI) networks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network by Sallim, Jamaludin

    Published 2017
    “…Ant colony optimization (ACO) is a metaheuristic algorithm that has been successfully applied to several types of optimization problems such as scheduling, routing, and more recently for solving protein functional module detection (PFMD) problem in protein-protein interaction (PPI) networks. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…Edge detection algorithm such as Canny algorithm is implemented to identify shoreline. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis