Search Results - (( pattern detection service algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…The obtained results show that by using the additional features the detection accuracy improved. The experimental evaluation based on real-world benchmark datasets shows that the selected unique patterns can achieve high detection accuracy with low false positive rate. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…Recently, one the most popular attack is denial of service (DoS) that attempt to be malicious pattern to compromise a server or a network resource. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…The proposed approach, Energy-Aware Multi-Dimensional Online Bin Packing (EAMDOBP), was tested against Power-aware best fit decreasing algorithm (PABFD), Modified Worst Fit decreasing algorithm (MWFD) and Hybrid Local Regression Host Overload Detection (HLRHOD). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study by Daru, April Firman, Hirzan, Alauddin Maulana, Mahmod Attar Bashi, Zainab Senan, Fanani, Fajriannoor

    Published 2025
    “…This problem can significantly affect local network performance or completely deny service to targeted servers. While numerous studies have proposed intrusion detection systems based on supervised learning models, a critical limitation persists. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    An early warning system for students at risk using supervised machine learning by Yam, Zheng Hong, Mohd Norshahriel, Abd Rani, Nabilah Filzah, Mohd Radzuan, Lim, Huay Yen, Sarasvathi, Nagalingam

    Published 2024
    “…Besides, this study also focuses on the Decision Tree, Random Forest, and XGBoost models in the system. The system will detect or forecast symptoms of dropout or potential dangers ahead of time, allowing educational institutions to anticipate problems and provide adequate educational services through appropriate intervention and response. …”
    Get full text
    Get full text
    Get full text
    Article