Search Results - (( data distribution detection algorithm ) OR ( data distribution tree algorithm ))

Refine Results
  1. 1

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  2. 2

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…The von Mises distribution is the most commonly used probability distribution of a circular random variable, and the concentration of a circular data set is measured using the mean resultant length. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…All of the measurement inputs from the experiment were tested for the data distribution and discrimination between the conditions of the latex using statistical analysis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…Withal, the large amount of high dimensional data might influence detection effectiveness and raise the computation requirements. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Oil palm mapping over Peninsular Malaysia using Google Earth Engine and machine learning algorithms by Shaharum, Nur Shafira Nisa, Mohd Shafri, Helmi Zulhaidi, Wan Ab. Karim Ghani, Wan Azlina, Samsatli, Sheila, Al-Habshi, Mohammed Mustafa, Yusuf, Badronnisa

    Published 2020
    “…In this study, 30 m Landsat 8 data were processed using a cloud computing platform of Google Earth Engine (GEE) in order to classify oil palm land cover using non-parametric machine learning algorithms such as Support Vector Machine (SVM), Classification and Regression Tree (CART) and Random Forest (RF) for the first time over Peninsular Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…This indicates that LiDAR data are highly efficient in detecting landslide characteristics in tropical forested areas. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by R.Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  20. 20