Search Results - (( using detection method algorithm ) OR ( using classification modelling algorithm ))

Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. Finally, both algorithms are validated against the findings in various literatures. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  3. 3

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…In a semiconductor industry, wafer defect detection has becoming ubiquitous. Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Alternate methods for anomaly detection in high-energy physics via semi-supervised learning by Md. Ali, Mohd. Adli, Badrud’din, Nu’man, Abdullah, Hafidzul, Kemi, Faiz

    Published 2020
    “…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…The SNS classification model use negative selection and PSO algorithms to form a set of memory Artificial Lymphocytes (ALCs) that have the ability to distinguish between normal and epileptic EEG patterns. …”
    Get full text
    Article
  10. 10
  11. 11

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…Predictions are aggregated using a soft voting mechanism. This research utilises the web page phishing detection dataset, which consists of 11,430 URLs with 87 features. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Experimental results show that the developed methods and model are able to classify the Harumanis quality with accuracy of 79% using fuzzy classification based on shape and size.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…A variety of record linkage algorithms with different steps have been developed in order to detect such duplicate records. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Wood texture detection with conjugate gradient neural network algorithm by Widyarto, Setyawan, Suryasa, I. Nyoman, Khairul Annuar, Abdullah, Fajarianto, Otto, Mohd Shafry, Mohd Rahim, Priyandoko, Gigih, Budaya, Gilang Anggit

    Published 2017
    “…This project explored fundamental methods to find the factors that can be used in classifying and detecting the type of wood. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A new intelligent multilayer framework for insider threat detection by Ahmad, Rabiah, Al-Mhiqani, Mohammed Nasser Ahmed, Zainal Abidin, Zaheera, Abdulkareem, Karrar Hameed, Mohammed, Mazin Abed, Gupta, Deepak K., Shankar K.

    Published 2021
    “…The selection procedure has been developed based on the integration of the entropy-VIKOR methods. For the second layer, a hybrid insider threat detection method has been proposed, where the Misuse Insider Threat Detection (MITD) model has been created using the random forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis