Search Results - (( program implementation function algorithm ) OR ( subset detection system algorithm ))
Search alternatives:
- implementation function »
- program implementation »
- function algorithm »
- subset detection »
- system algorithm »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. In this paper, an improved intrusion detection algorithm for multiclass classification was presented and discussed in detail. …”
Get full text
Get full text
Get full text
Article -
2
SVM for network anomaly detection using ACO feature subset
Published 2016“…To cope with this problem different systems have been developed and the systems are known as Intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
4
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
5
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
6
-
7
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
Get full text
Get full text
Get full text
Article -
8
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…New intrusion types, of which detection systems are unaware, are the most difficult to detect. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
10
GA-based feature subset selection in a spam/non-spam detection system
Published 2012Get full text
Get full text
Conference or Workshop Item -
11
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
12
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The ant colony optimisation (ACO) algorithm have been used to select feature subset. …”
Get full text
Get full text
Get full text
Thesis -
13
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
Published 2019“…This paper proposes a new feature selection framework for machine learning-based phishing detection system, called the Hybrid Ensemble Feature Selection (HEFS). …”
Get full text
Get full text
Get full text
Article -
14
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. …”
Get full text
Get full text
Get full text
Article -
15
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…Feature selection represents an important preprocessing step in many intelligent and expert systems such as intrusion detection, disease prediction, and sentiment analysis. …”
Get full text
Get full text
Article -
16
-
17
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
18
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
19
Projecting image on non-planar surface with zero-th order geometric continuity using simple dual-linear function and manipulation of strict integer implementation in programming la...
Published 2015“…Usage of a projection system to display large screen images is still relevant in the midst of LED-based display increasing popularity.This is due to that the system itself is a mature technology, reliable and cheaper than the LED counterpart.While various methods had addressed the projection problems on curve surface, projecting image on jagged like surface (zero order geometric continuity) has yet to be studied in depth.This paper proposes a method for projecting image on non-planar surface with zero-order geometric continuity property using parametric modeling.The method manipulate linear function by combining two functions into one by taking advantage of computer programs strict implementation of integer variables.The method was applied to grid-based texturing algorithm in order to create the desired zero-continuity effect on the surface.The method was compared with texturing that implement existing curve algorithm to project image on the screen.Visual evaluation results showed that the proposed method fared better compared to existing curve-based projection algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
