Search Results - (( program implementation mining algorithm ) OR ( parameter detection system algorithm ))
Search alternatives:
- program implementation »
- implementation mining »
- parameter detection »
- mining algorithm »
- system algorithm »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. …”
Get full text
Get full text
Get full text
Article -
2
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…Machine learning is an implementation of artificial intelligence (Al) that allows systems to learn and build on knowledge without being directly programmed automatically. …”
Get full text
Get full text
Thesis -
3
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
4
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
5
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
6
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
7
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
8
-
9
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…Analytical redundancy based fault detection system generally requires an accurate model. …”
Get full text
Conference or Workshop Item -
10
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…The recommended system’s parameters were assessed, which demonstrated its superiority versus other previously developed systems. …”
Get full text
Get full text
Article -
11
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…The other 40% of the dataset is used to test generated rules. A simple program of C++ is implemented using Microsoft Visual Studio to test generated rules until accuracy of performance is obtained. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
14
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Therefore, the aim of the study is to identify a fast, simple, and reliable method of FD on GCPV system in Malaysia. The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
15
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
Get full text
Get full text
Get full text
Article -
16
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…Fuzzy system is a rule-based system by using human experts which hold the truth values or membership values to make a particular decision while fuzzy modelling is a process of identifying the fuzzy parameter. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
18
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
19
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…In this research, a hand-written character recognition model are implemented in C++ programming with ability to classify digits 0, 1, 2, and 3. …”
Get full text
Get full text
Thesis -
20
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article
