Search Results - (( java application using algorithm ) OR ( pattern detection ((a algorithm) OR (new algorithm)) ))
Search alternatives:
- pattern detection »
- java application »
- using algorithm »
- new algorithm »
- a algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
-
3
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…This paper proposes a new algorithm for high-impedance-fault (HIF) detection based on phase displacement computation (PDC). …”
Get full text
Get full text
Article -
4
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
Get full text
Get full text
Thesis -
5
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
6
A new split based searching for exact pattern matching for natural texts
Published 2018“…For a given text, the proposed algorithm split the query pattern into two equal halves and considers the second (right) half as a query string for searching in Corpus. …”
Get full text
Get full text
Article -
7
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
8
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
9
An adaptive anomaly threshold in artificial dendrite cell algorithm
Published 2017“…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Environmental pollution monitoring: a novel vectorial algorithm technique for oil detection in wastewater
Published 2023“…It is found that the new algorithm is capable of detecting the presence of oil in water samples containing many other unknown polluting elements up to 0.1 mg/L. …”
Article -
12
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
Get full text
Get full text
Article -
13
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…This project attempts to accurately detect the type of dyslexic handwriting. Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
Get full text
Get full text
Thesis -
14
A new hough transform on face detection and recognition using integrated histograms
Published 2015“…This study discovered a new feature detection and extraction using the HT. …”
Get full text
Get full text
Article -
15
An improved artificial dendrite cell algorithm for abnormal signal detection
Published 2018“…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
Get full text
Get full text
Get full text
Article -
16
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
17
Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour
Published 2014“…Survey response patterns seem heavily determined by semantics. Language algorithms may suggest these prior to administering a survey. …”
Get full text
Get full text
Get full text
Article -
18
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…We tested the algorithms’ capability to create distinct anomalous patterns in the presence of BSM samples and also compare their classification output metrics to the Isolation Forest (ISF), a well-known anomaly detection algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
Published 2019“…This paper proposes a new design of a glass break detection algorithm based on Fuzzy Deep Auto-encoder Neural Network. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article
