Search Results - (( pattern detection computer algorithm ) OR ( java application using algorithm ))
Search alternatives:
- pattern detection »
- java application »
- using algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…This paper proposes a new algorithm for high-impedance-fault (HIF) detection based on phase displacement computation (PDC). …”
Get full text
Get full text
Article -
3
-
4
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
5
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
6
A study on advanced statistical analysis for network anomaly detection
Published 2005Get full text
Monograph -
7
Classification and detection of intelligent house resident activities using multiagent
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009Get full text
Article -
9
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
10
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
A new split based searching for exact pattern matching for natural texts
Published 2018Get full text
Get full text
Article -
13
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
14
-
15
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Toward heterogeneous computing to facilitate sequential OLAP real-time applications
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
18
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Network monitoring system consists of large data streams, distributed architecture, and multiple computers that are geographically located all over the world caused a difficulty to detect abnormalities in the system. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
