Search Results - (( java pattern classification algorithm ) OR ( using subset detection algorithm ))
Search alternatives:
- pattern classification »
- subset detection »
- using subset »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
2
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Further, the shortage of efficient feature selection techniques gives rise to low accuracy in anomaly detection. One of the main steps after the data collection stage of any method is selecting a subset of the features to be used for the feature selection process. …”
Get full text
Get full text
Thesis -
4
SVM for network anomaly detection using ACO feature subset
Published 2016“…The selected feature subset using ant system is then validated using support vector machine. …”
Get full text
Get full text
Conference or Workshop Item -
5
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
6
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
7
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…We used data set from 1999 KDD intrusion detection contest.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Algorithm of face recognition by principal component analysis
Published 2002“…A database of about 400 facial images was used to test the algorithm. Each image is represented by a matrix (112x 92). …”
Get full text
Get full text
Article -
9
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
10
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
11
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
12
GA-based feature subset selection in a spam/non-spam detection system
Published 2012Get full text
Get full text
Conference or Workshop Item -
13
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
15
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
Published 2019“…The second phase derives a set of baseline features from the secondary feature subsets by using a function perturbation ensemble. …”
Get full text
Get full text
Get full text
Article -
16
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The ant colony optimisation (ACO) algorithm have been used to select feature subset. …”
Get full text
Get full text
Get full text
Thesis -
17
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
Get full text
Get full text
Article -
18
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
19
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The project proposed a dynamic analysis technique in Android malware detection. The objectives of the project are to investigate the Android malware using dynamic analysis technique and to enhance the accuracy of malware detection. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Attacks detection in 6G wireless networks using machine learning
Published 2023“…Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
