Search Results - (( rate detection method algorithm ) OR ( parallel visualization based algorithm ))

Refine Results
  1. 1

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    The visualization of three dimensional brain tumors' growth on distributed parallel computer systems by Alias, Norma, Masseri, Mohd. Ikhwan Safa, Islam, Md. Rajibul, Khalid, Siti Nurhidayah

    Published 2009
    “…The main objective of this study is to visualize the brain tumors’ growth in three-dimensional and implement the algorithm on distributed parallel computer systems. …”
    Get full text
    Get full text
    Article
  3. 3

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…These courses will actively engage the students in exploring the concepts of the development the parallel algorithm in visualizing the grand challenge applications of mathematical problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The processing large sparse matrixes are based on multiprocessor computer systems for abnormal growth visualization. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt by Akhtar, M.N., Ahmed, W., Kakar, M.R., Bakar, E.A., Othman, A.R., Bueno, M.

    Published 2020
    “…Therefore, the execution time of the image processing algorithm is also an essential aspect of quality. This manuscript proposes a parallel k means for image processing (PKIP) algorithm using multiprocessing and distributed computing to assess the adhesion failure in WMA and HMA samples subjected to three different moisture sensitivity tests (dry, one, and three freeze-thaw cycles) and fractured by indirect tensile test. …”
    Get full text
    Get full text
    Article
  11. 11

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…A series of experimental results demonstrate that the proposed method can effectively detect anomalies with low false positive rate, high detection rate and achieve higher detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  14. 14

    Parallel batch self-organizing map on graphics processing unit using CUDA by Daneshpajouh, H., Delisle, P., Boisson, J.-C., Krajecki, M., Zakaria, N.

    Published 2018
    “…The most computationally expensive parts of its training algorithm (such as steps to compute distance between each data vector and neuron, and determining the Best Matching Unit based on minimum distance) are identified and mapped on GPU to be processed in parallel. …”
    Get full text
    Get full text
    Article
  15. 15

    Parallel batch self-organizing map on graphics processing unit using CUDA by Daneshpajouh, H., Delisle, P., Boisson, J.-C., Krajecki, M., Zakaria, N.

    Published 2018
    “…The most computationally expensive parts of its training algorithm (such as steps to compute distance between each data vector and neuron, and determining the Best Matching Unit based on minimum distance) are identified and mapped on GPU to be processed in parallel. …”
    Get full text
    Get full text
    Article
  16. 16

    On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection by Jia, Liu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The experimental results demonstrate that the proposed method is better than that of the original ResNet and other existing methods on various metrics, reaching a 98.88% detection rate and 1.11% false alarm rate on the KDDTrain+ dataset…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
    Get full text
    Get full text
    Thesis
  20. 20

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis