Search Results - (( binary classification using algorithm ) OR ( security classifications using algorithm ))

Refine Results
  1. 1

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…In this project, a classification system is proposed with the one-dimensional local binary pattern algorithm (1D-LBP) with the K-Nearest Neighbour (K-NN) classifier and the system is developed by using a Raspberry Pi 3.There are eight different subjects used to classify in this classification system and each subject consists of seven samples of normalized iris image as input to the system. …”
    Get full text
    Get full text
    Monograph
  2. 2

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
    Get full text
    Get full text
    Article
  4. 4

    Novel Feature Extraction and Representation for Currency Classification by Wang, Hui Hui, Wang, Yin Chai, Wee, Bui Lin, Marcus, Chen

    Published 2023
    “…The proposed method could be useful for various applications, including financial institutions, security agencies, and automated currency processing machines.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Global and local clustering soft assignment for intrusion detection system: a comparative study by Mohd Rizal Kadis, Azizi Abdullah

    Published 2017
    “…For this purpose, the soft assignment approach is used for indexing on KDD input and SVM for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…Factors which impact PCANet are studied to identify the limitations of PCANet. For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. …”
    Get full text
    Get full text
    Monograph
  9. 9

    A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network by Adnan Shahid, Khan, ZEESHAN, AHMAD, JOHARI, ABDULLAH, FARHAN, AHMAD

    Published 2021
    “…The experimental results have shown about 2.5% − 4% improvement in accurately detecting intrusions compared to other deep learning (DL) algorithms while at the same time reducing the FAR by 4.3%−6.7% considering binary classification scenario. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…To address this problem, this study first uses CART (Classification and Regression Tree) to enhance the depth of ANFIS, providing a deeper and interpretable hybrid architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…We added batch normalization and dropout layers to the model to increase its performance. Based on the binary and multiclass classification, the model was trained using three datasets: CIC-IDS 2017, UNSW-NB15, and WSN-DS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The effect of dataset imbalance on the performance of SCADA intrusion detection systems by Balla, Asaad, Habaebi, Mohamed Hadi, Elsheikh, Elfatih A A, Islam, Md Rafiqul, Suliman, F M

    Published 2023
    “…Countless studies used deep learning algorithms to design an efficient IDS; however, the fundamental issue of imbalanced datasets was not fully addressed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A New Quadratic Binary Harris Hawk Optimization For Feature Selection by Abdullah, Abdul Rahim, Too, Jing Wei, Mohd Saad, Norhashimah

    Published 2019
    “…A comparative study is conducted to compare the effectiveness of QBHHO with other feature selection algorithms such as binary differential evolution (BDE), genetic algorithm (GA), binary multi-verse optimizer (BMVO), binary flower pollination algorithm (BFPA), and binary salp swarm algorithm (BSSA). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization by Too, Jing Wei, Tee, Wei Hown, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani by Ab Ghani, Nur Laila

    Published 2015
    “…The urban growth images obtained are analysed to improve existing classification algorithms. The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…In this regard, this thesis proposes five FS methods for efficient EMG signals classification. The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Improving amphetamine-type stimulants drug classification using chaotic-based time-varying binary whale optimization algorithm by Draman @ Muda, Azah Kamilah, Mohd Yusof, Norfadzlia, Pratama, Satrya Fajri, Carbo-Dorca, Ramon, Abraham, Ajith

    Published 2022
    “…A new chaotic time-varying binary whale optimization algorithm (CBWOATV) is introduced in this paper to optimize the feature selection process in Amphetamine-type Stimulants (ATS) and non-ATS drugs classification. …”
    Get full text
    Get full text
    Get full text
    Article