Search Results - (( rate detection system algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- system algorithm »
- java application »
- rate detection »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Machine learning algorithms in context of intrusion detection
Published 2016“…The result shows that not a single algorithm has a high detection rate for each class of KDD99 dataset. …”
Get full text
Get full text
Conference or Workshop Item -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
4
Object detection system using haar-classifier
Published 2009“…Object detection system using Haar-classifier algorithm can perform best performance of high detection rate and high level of accuracy rate.…”
Get full text
Get full text
Undergraduates Project Papers -
5
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
6
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
7
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
9
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. …”
Get full text
Get full text
Thesis -
10
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
12
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
Get full text
Get full text
Get full text
Article -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…This signifies that CSDE-V-Detectors can efficiently attain highest detection rates and lowest false alarm rates for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…Deep Residual Networks (ResNets) are prone to overfitting in problems with uncertainty, such as intrusion detection problems. To alleviate this problem, we proposed a method that combines the Adaptive Neuro-fuzzy Inference System (ANFIS) and the ResNet algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
19
Improving intrusion detection using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one of the key security components in today’s networking environment. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis
