Search Results - (( mobile information method algorithm ) OR ( rate detection based algorithm ))
Search alternatives:
- mobile information »
- information method »
- method algorithm »
- detection based »
- rate detection »
-
1
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…The aim of this study is to propose an innovative multi-sensor fusion framework to improve human activity detection performances and reduce misrecognition rate. …”
Get full text
Get full text
Article -
3
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
Get full text
Get full text
Thesis -
4
-
5
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
Get full text
Get full text
Thesis -
6
-
7
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
8
Fruity vegetable recognition system using Color Histogram and BRISK features extraction / Siti Hajar Mohd Nasri
Published 2016“…In process to extract the two main features, K-means clustering algorithm is used as background subtraction method with combination of Canny’s Edge Detection and Mathematical Morphology Operation for shape extraction. …”
Get full text
Get full text
Thesis -
9
Machine learning algorithms in context of intrusion detection
Published 2016“…Although, signature based has high detection rate but it cannot detect novel attacks. …”
Get full text
Get full text
Conference or Workshop Item -
10
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Experimental results show the proposed technique increases accuracy classification percentage up to 99.95%; and the minimum number of bins determine good discretization algorithm. Consequently, attack detection rate increases and false positive alarm rate minimizes. …”
Get full text
Get full text
Thesis -
11
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
13
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
14
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
15
Analysis of confidentiality algorithms in different mobile generations
Published 2017“…Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…To achieve that, an anthrax disease outbreak is chosen as a case study.Two artificial anthrax datasets known as WSARE7 and WSARE58 are taken as experiment data.The experiment is measured based on five metrics; detection rate, specificity, false alarm rate, accuracy, and time taken to produce result. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
18
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
19
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
20
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
Get full text
Get full text
Get full text
Article
