Search Results - (( data detection method algorithm ) OR ( problem application system algorithm ))

Refine Results
  1. 1

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  5. 5

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. …”
    Get full text
    Get full text
    Book Chapter
  7. 7

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…Many studies have been carried out so far, but for Quran handwriting has not been researched as thoroughly as Arabic, Latin or Chinese handwritten systems. The current research is focused on solving the mentioned problems through improving the accuracy of recognition rate of AOCR by proposing a new segmentation, feature extraction methods and finding a suitable classification. …”
    Get full text
    Get full text
    Thesis
  11. 11

    LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO by MAHABADI, SEYED ALI KASAEIZADEH MAHABADI

    Published 2010
    “…Correspondence is the method of detecting the real world object reflections in two camera views. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…This research addressed severe contamination or occlusion presence in a face recognition based on image data. A modified version of the existing least trimmed square, LTS method with genetic algorithm (LTS with GAs) was proposed to cater the problem of noise or occlusion and improve the performance of face recognition. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…There have been many methods of traffic data collection proposed and implemented over the years, each with their own pros and cons. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2005
    “…In this data collection method, part of the dataset contains erroneous data, as measurements are always associated with uncertainties. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
    Get full text
    Get full text
    Thesis