Search Results - (( a detection based algorithm ) OR ( data classification system algorithm ))
Search alternatives:
- classification system »
- data classification »
- system algorithm »
- detection based »
- a detection »
-
1
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
2
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Evaluation of fall detection classification approaches
Published 2012“…The acceleration data with a total data of 6962 instances and 29 attributes were used to evaluate the performance of the different classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
5
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…This condition is attributed to the increasing number of audit data features and the decreasing performance of human-based smart intrusion detection systems regarding classification accuracy, false alarm rate, and classification time. …”
Get full text
Get full text
Get full text
Article -
6
SVM for network anomaly detection using ACO feature subset
Published 2016“…This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…This paper proposed the fuzzy-ID3 (FID3) algorithm, a fuzzy decision tree as the classification method in breast cancer detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…A well-known ICS is the Supervisory Control and Data Acquisition (SCADA) system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Conference or Workshop Item -
10
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
11
Accuracy and performance analysis for classification algorithms based on biomedical datasets
Published 2021“…The study suggests finding a classifier among the most common kinds of classification algorithms within a combined approach represent in Bayesian, Trees, Rules, Function, and lazy algorithms to automate a better performance of early detection of diseases from the medical datasets. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Embedded Fuzzy Classifier for Detection and Classification of Preseizure state using Real EEG data
Published 2014“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Book Section -
13
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
14
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim
Published 2015“…For this purpose, an algorithm which hybridized the Intensity Based Analysis (IBA), Grey Level Co-occurrence Matrices (GLCM), Adaptive Network-based Fuzzy Inference System (ANFIS) and £article ~warm Optimization (PSO) Clustering Algorithm (CAPSOCA) is proposed. …”
Get full text
Get full text
Thesis -
17
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
18
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. …”
Get full text
Get full text
Get full text
Article -
19
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
Get full text
Get full text
Get full text
Article -
20
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article
