Search Results - (( based evaluation tree algorithm ) OR ( rate detection system algorithm ))*
Search alternatives:
- based evaluation »
- system algorithm »
- evaluation tree »
- tree algorithm »
- rate detection »
-
1
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Get full text
Article -
4
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
Get full text
Get full text
Article -
5
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…The most common method of detecting malware relies on signature-based detection. …”
Get full text
Get full text
Thesis -
6
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
7
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
Get full text
Get full text
Get full text
Thesis -
8
An improved hybrid learning approach for better anomaly detection
Published 2011“…In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
Get full text
Get full text
Thesis -
9
Optimized Decision Forest for Website Phishing Detection
Published 2021“…In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
10
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
11
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. The decision tree's effectiveness and accuracy in predicting laptop prices are evaluated through rigorous testing and validation. …”
Get full text
Get full text
Thesis -
12
Machine learning algorithms in context of intrusion detection
Published 2016“…The result shows that not a single algorithm has a high detection rate for each class of KDD99 dataset. …”
Get full text
Get full text
Conference or Workshop Item -
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
14
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second and third scenarios evaluate the performance of Coalition-Based Index-Tree by examining the effects of Dynamic-Coalition framework and Static-Coalition algorithm on Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
15
Object detection system using haar-classifier
Published 2009“…Object detection system using Haar-classifier algorithm can perform best performance of high detection rate and high level of accuracy rate.…”
Get full text
Get full text
Undergraduates Project Papers -
16
An early warning system for students at risk using supervised machine learning
Published 2024“…Besides, this study also focuses on the Decision Tree, Random Forest, and XGBoost models in the system. …”
Get full text
Get full text
Get full text
Article -
17
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
18
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
19
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
20
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis
