Search Results - (( parallel distribution factor algorithm ) OR ( parallel intrusion detection algorithm ))
Search alternatives:
- parallel distribution »
- distribution factor »
- factor algorithm »
- intrusion »
-
1
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed of the detection engine used in SNORT-NIDS. …”
Get full text
Get full text
Thesis -
2
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
3
Effect Of The Addition Of Wastepaper To Concrete Mix
Published 2009“…Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed of the detection engine used in SNORT-NIDS. …”
Get full text
Get full text
Thesis -
4
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
5
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
Get full text
Get full text
Thesis -
8
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…Parallel power loads anomalies are processed by a fast-density peak clustering technique that capitalizes on the hybrid strengths of Canopy and K-means algorithms all within Apache Mahout's distributed machine-learning environment. …”
Article -
10
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
Get full text
Get full text
Research Report -
11
Improved black-winged kite algorithm and finite element analysis for robot parallel gripper design
Published 2024“…The Good Point Set (GPS), nonlinear convergence factor, and adaptive t-distribution method improve BKA, which enhances exploration and exploitation performance, convergence speed, and solution quality. …”
Get full text
Get full text
Get full text
Article -
12
Design and analysis of management platform based on financial big data
Published 2023“…In addition, a financial data management platform based on distributed Hadoop architecture is designed, which combines MapReduce framework with the fuzzy clustering algorithm and the local outlier factor (LOF) algorithm, and uses MapReduce to operate in parallel with the two algorithms, thus improving the performance of the algorithm and the accuracy of the algorithm, and helping to improve the operational efficiency of enterprise financial data processing. …”
Get full text
Get full text
Get full text
Article -
13
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…A highly parallel approach based on simple inter-map conjunctions, or correspondence distributions, is chosen and tested on synthetic and real patterns. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
