Search Results - (( network detection clustering algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- detection clustering »
- network detection »
- java application »
-
1
A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network
Published 2016“…In this thesis, a Reinforcement Learning (RL) based clustering algorithm is proposed to address energy and Primary Users (PUs) detection challenges in CR-WSN. …”
Get full text
Get full text
Thesis -
2
An energy-efficient spectrum-aware reinforcement learning-based clustering algorithm for cognitive radio sensor networks
Published 2015“…We first model the network energy consumption and then determine the optimal number of clusters for the network. …”
Get full text
Get full text
Get full text
Article -
3
An Improved LEACH Algorithm Based On Fuzzy C-Means Algorithm And Distributed Cluster Head Selection Mechanism.
Published 2019“…The comparison of therecommended algorithm with LEACH algorithm is conducted, in relations to energy consumption and network lifetime. …”
Get full text
Get full text
Get full text
Article -
4
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…Human skin detection is an important preprocessing step in many applications involving images such as face detection, gesture tracking, and nudity detection. …”
Get full text
Get full text
Thesis -
5
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
6
Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network
Published 2013“…As energy is a challenging issue in these networks, clustering models are used to overcome this problem. …”
Get full text
Get full text
Article -
7
-
8
Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset
Published 2020“…In this paper, a conditional generative adversarial network (CGAN) and improved fuzzy c-means clustering (IFCM) algorithm called CGAN-IFCM is proposed for the multi-class voice disorder detection of three common types of voice disorders. …”
Get full text
Get full text
Article -
9
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
Get full text
Get full text
Get full text
Article -
12
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
A clustering-based method for outlier detection under concept drift
Published 2024“…The proposed approach CADSD (Cluster-based Anomaly Detection with Streaming Data), operates in real-time without pre-training. …”
Get full text
Get full text
Get full text
Article -
14
Improving K-Means Clustering using discretization technique in Network Intrusion Detection System
Published 2016“…Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. …”
Get full text
Get full text
Conference or Workshop Item -
15
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A multi-view clustering algorithm for attributed weighted multi-edge directed networks
Published 2022“…Graph clustering acts as a critical topic for solving decision situations in networks. …”
Get full text
Get full text
Article -
17
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
18
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
19
Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network
Published 2019“…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
Get full text
Get full text
Get full text
Article -
20
Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification
Published 2014“…In recent times, Intrusion Detection systems (IDSs) incarnate the high network security. …”
Get full text
Get full text
Article
