Search Results - (( using detection method algorithm ) OR ( using classification modelling algorithm ))
Search alternatives:
- classification modelling »
- using classification »
- modelling algorithm »
- method algorithm »
- using detection »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. Finally, both algorithms are validated against the findings in various literatures. …”
Get full text
Get full text
Thesis -
2
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
Get full text
Get full text
Get full text
Citation Index Journal -
3
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
4
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
5
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…In a semiconductor industry, wafer defect detection has becoming ubiquitous. Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
7
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
Get full text
Get full text
Get full text
Article -
8
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
9
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…The SNS classification model use negative selection and PSO algorithms to form a set of memory Artificial Lymphocytes (ALCs) that have the ability to distinguish between normal and epileptic EEG patterns. …”
Get full text
Article -
10
Comparison of supervised classification technique of landuse map using high resolution image / Muhammad Firdaus Mohammad Harun
Published 2019“…The algorithm were used to perform the supervised classification. …”
Get full text
Get full text
Thesis -
11
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
12
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
13
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…Predictions are aggregated using a soft voting mechanism. This research utilises the web page phishing detection dataset, which consists of 11,430 URLs with 87 features. …”
Get full text
Get full text
Get full text
Article -
14
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
15
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
16
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Experimental results show that the developed methods and model are able to classify the Harumanis quality with accuracy of 79% using fuzzy classification based on shape and size.…”
Get full text
Get full text
Thesis -
17
A comparative study in classification techniques for unsupervised record linkage model
Published 2011“…A variety of record linkage algorithms with different steps have been developed in order to detect such duplicate records. …”
Get full text
Get full text
Get full text
Article -
18
Wood texture detection with conjugate gradient neural network algorithm
Published 2017“…This project explored fundamental methods to find the factors that can be used in classifying and detecting the type of wood. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A new intelligent multilayer framework for insider threat detection
Published 2021“…The selection procedure has been developed based on the integration of the entropy-VIKOR methods. For the second layer, a hybrid insider threat detection method has been proposed, where the Misuse Insider Threat Detection (MITD) model has been created using the random forest algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis
