Search Results - (( processes evaluation detection algorithm ) OR ( java application tools algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article
  6. 6

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A semi-synchronous label propagation algorithm with constraints for community detection in complex networks by Chin, J.H., Ratnavelu, K.

    Published 2017
    “…Constraints are utilised during the label propagation and community merging processes. The performance of the proposed algorithm is evaluated on various benchmark and real-world networks. …”
    Get full text
    Get full text
    Article
  12. 12

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Execution time optimization analysis on multiple algorithms performance of moving object edge detection by Islam S.Z., Islam S.Z., Jidin R., Mohd. Ali Mohd.A.

    Published 2023
    “…This paper analyzes execution time optimization analysis between Sobel and Canny image processing algorithms in terms of moving objects edge detection. …”
    Conference paper
  14. 14

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Broad impulse noise model has been employed for the evaluation process, to investigate the robustness of the method. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  18. 18

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis