Search Results - (( security classification technique algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1

    K-NN classifier for data confidentiality in cloud computing by Zardari, M.A., Jung, L.T., Zakaria, N.

    Published 2014
    “…In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria by Zakaria, Mohd Fathi

    Published 2010
    “…A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm by Muhamad Zahim, Sujod, Siti Nor Azlina, Mohd Ghazali, Mohd Fadzil, Abdul Kadir, Al-Shetwi, Ali Qasem

    Published 2024
    “…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING by ONG KANG WEI, ONG KANG WEI, LOH SER LEE, LOH SER LEE

    Published 2022
    “…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
    Get full text
    Get full text
    Thesis
  12. 12

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Review on Soft Computing Technique in Intrusion Detection System by Sulaiman, Noor Suhana, Rohani, Abu Bakar, Norrozila, Sulaiman

    Published 2012
    “…In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification by Ghanem, W.A.H.M, El-Ebiary, Y.A.B., Abdulnab, M., Tubishat, M., Alduais, N.A.M., Nasser, A.B., Abdullah, N., Al-wesabi, O.A.

    Published 2021
    “…This article proposes a cyber-intrusion detecting system classification with MLP trained by a hybrid metaheuristic algorithm and feature selection based on multi-objective wrapper method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…Integration of multimodal biometrics is one of the well known techniques for security enhancement. Hence, in this research the integration of car plate and face recognition as security enhancement in private parking area has been developed to ensure the car is driven by the authorized or registered owner. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20