Search Results - (( java simulation optimization algorithm ) OR ( subset detection techniques algorithm ))
Search alternatives:
- detection techniques »
- subset detection »
- java simulation »
-
1
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
2
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…ITLBO with supervised machine learning (ML) technique was used for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Further, the shortage of efficient feature selection techniques gives rise to low accuracy in anomaly detection. …”
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
5
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
6
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, accurate detection of network attack is imperative. A variety of intrusion detection approaches are available but the main problem is their performance, which can be enhanced by increasing the detection rates and reducing false positives. …”
Get full text
Get full text
Thesis -
7
Algorithm of face recognition by principal component analysis
Published 2002“…The method proved to be simple and effective. The simplified algorithm and techniques expected the process without seriously compromising the accuracy.…”
Get full text
Get full text
Article -
8
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
Get full text
Get full text
Get full text
Article -
9
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, accurate detection of network attack is imperative. A variety of intrusion detection approaches are available but the main problem is their performance, which can be enhanced by increasing the detection rates and reducing false positives. …”
Get full text
Get full text
Thesis -
10
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Traditional intrusion detection techniques have had trouble dealing with dynamic environments. …”
Get full text
Get full text
Get full text
Thesis -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
12
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The ant colony optimisation (ACO) algorithm have been used to select feature subset. …”
Get full text
Get full text
Get full text
Thesis -
13
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
14
-
15
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
16
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The project proposed a dynamic analysis technique in Android malware detection. The objectives of the project are to investigate the Android malware using dynamic analysis technique and to enhance the accuracy of malware detection. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
18
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
Get full text
Get full text
Conference or Workshop Item -
19
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
Published 2019“…In the first phase of HEFS, a novel Cumulative Distribution Function gradient (CDF-g) algorithm is exploited to produce primary feature subsets, which are then fed into a data perturbation ensemble to yield secondary feature subsets. …”
Get full text
Get full text
Get full text
Article -
20
Feature Ranking Techniques For 3D ATS Drug Molecular Structure Identification
Published 2018“…The proposed feature selection approach has a simple algorithmic framework and makes use of the existing feature selection techniques to cater different variety of data issues, namely Ensemble Filter-Embedded Feature Ranking Approach (FEFR). …”
Get full text
Get full text
Get full text
Get full text
Thesis
