Search Results - (( rate detection algorithm ) OR ( waste ((reduction algorithm) OR (evolution algorithm)) ))

Refine Results
  1. 1

    Snort-based smart and swift intrusion detection system by Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Najeeb, Athaur Rahman, Ku zahir, Ku Nor Afiza, Hussain, Sabahat

    Published 2018
    “…Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Backtracking search algorithm in CVRP models for efficient solid waste collection and route optimization by Akhtar M., Hannan M.A., Begum R.A., Basri H., Scavino E.

    Published 2023
    “…Bins; Budget control; Carbon dioxide; Cost reduction; Costs; Crashworthiness; Efficiency; Environmental impact; Fuels; Learning algorithms; Optimization; Solid wastes; Vehicle routing; Backtracking search algorithms; Capacitated vehicle routing problem; Environmental emissions; Optimization modeling; Route optimization; Solid waste collection; Threshold waste level; Waste collection; Waste management; fuel; carbon dioxide; solid waste; algorithm; fuel consumption; modeling; optimization; solid waste; threshold; waste management; algorithm; Article; backtracking search algorithm; capacitated vehicle routing problem model; carbon footprint; controlled study; environmental impact assessment; feasibility study; limit of quantitation; measurement precision; process model; process optimization; solid waste collection; solid waste management; motor vehicle; procedures; solid waste; theoretical model; waste disposal; Algorithms; Carbon Dioxide; Models, Theoretical; Motor Vehicles; Refuse Disposal; Solid Waste…”
    Article
  3. 3

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…The result shows that not a single algorithm has a high detection rate for each class of KDD99 dataset. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm by Mohamad Fadzil, Nur Hamisha Helanie

    Published 2025
    “…This study proposed the application of the Artificial Bee Colony (ABC) algorithm to address the Capacitated Vehicle Routing Problem (CVRP) in a real-world waste collection scenario. …”
    Get full text
    Get full text
    Student Project
  7. 7
  8. 8

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…Besides that, a comparison is made with Cumulative Sum, Exponentially-weighted Moving Average, and Multi Layer Perceptron.From the experiment, the best parameter setting for anthrax outbreak using dendrite cell algorithm is identified whereby it proven can helps the model to produce a good detection result between detection rate and false alarm rate.Since each outbreak disease carries different outbreak characteristic, the parameter setting for different outbreak might be different.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Experimental results show the proposed technique increases accuracy classification percentage up to 99.95%; and the minimum number of bins determine good discretization algorithm. Consequently, attack detection rate increases and false positive alarm rate minimizes. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…The experimental results demonstrate that the proposed approach outperforms the existing techniques, with the detection rate of attack and false alarm rates of 95.7265 and 4.2735, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Designing a new model for Trojan horse detection using sequential minimal optimization by Madihah Mohd Saudi, Abuzaid A.M., Taib B.M., Abdullah Z.H.

    Published 2024
    Subjects: “…Malwares Trojan horse Detection Automated analysis Sequential minimal optimization (SMO) True positive rate False positive rate Machine learning…”
    Conference Paper
  15. 15

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…Object detection system using Haar-classifier algorithm can perform best performance of high detection rate and high level of accuracy rate.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection by Ooi, Hui Ni, Ab Rahman, Nurul Hidayah

    Published 2021
    “…Besides, Multilayer Perceptron algorithm has high true positive rate (TPR) in the detection of APT attack compared to Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Other
  18. 18

    Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  20. 20

    A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection by Ooi, Hui Ni, Ab Rahman, Nurul Hidayah

    Published 2021
    “…Besides, Multilayer Perceptron algorithm has high true positive rate (TPR) in the detection of APT attack compared to Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Other