This document compares using genetic algorithm (GA) optimization with artificial neural networks (ANN) and support vector machines (SVM) for intrusion detection. It first describes ANN, SVM, and GA techniques. It then applies GA to optimize the feature selection and classification performed by ANN and SVM on the KDD Cup 99 intrusion detection dataset. The results show that GA improved the performance of both ANN and SVM classifiers, achieving 100% detection rates. Specifically, GA-ANN achieved the highest detection rate using the fewest number of features (100% detection using only 18 features), demonstrating GA's greater effectiveness at optimizing ANN compared to SVM.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A survey of modified support vector machine using particle of swarm optimizat...Editor Jacotech
The main objective of this survey paper is to provide a detailed description of Wireless Sensor Networks with Medium Access Control layer and Routing layer. In the medium access control layer, Event Driven Time Division Multiple Access protocol is studied and in Network layer, two routing protocols Bellman-Ford and Dynamic Source Routing are studied.
Classification of Machine Learning AlgorithmsAM Publications
The goal of various machine learning algorithms is to device learning algorithms that learns automatically without any human intervention or assistance. The emphasis of machine learning is on automatic methods. Supervised Learning, unsupervised learning and reinforcement learning are discussed in this paper. Machine learning is the core area of Artificial Intelligence. Although a subarea of AI, machine learning also intersects broadly with other fields, especially statistics, but also mathematics, physics, theoretical computer science and more.
Machine learning workshop, session 3.
- Data sets
- Machine Learning Algorithms
- Algorithms by Learning Style
- Algorithms by Similarity
- People to follow
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A survey of modified support vector machine using particle of swarm optimizat...Editor Jacotech
The main objective of this survey paper is to provide a detailed description of Wireless Sensor Networks with Medium Access Control layer and Routing layer. In the medium access control layer, Event Driven Time Division Multiple Access protocol is studied and in Network layer, two routing protocols Bellman-Ford and Dynamic Source Routing are studied.
Classification of Machine Learning AlgorithmsAM Publications
The goal of various machine learning algorithms is to device learning algorithms that learns automatically without any human intervention or assistance. The emphasis of machine learning is on automatic methods. Supervised Learning, unsupervised learning and reinforcement learning are discussed in this paper. Machine learning is the core area of Artificial Intelligence. Although a subarea of AI, machine learning also intersects broadly with other fields, especially statistics, but also mathematics, physics, theoretical computer science and more.
Machine learning workshop, session 3.
- Data sets
- Machine Learning Algorithms
- Algorithms by Learning Style
- Algorithms by Similarity
- People to follow
Simplified Knowledge Prediction: Application of Machine Learning in Real LifePeea Bal Chakraborty
Machine learning is the scientific study of algorithms and statistical models that is used by the machines to perform a specific task depending on patterns and inference rather than explicit instructions. This research and analysis aims to observe how precisely a machine can predict that a patient suspected of breast cancer is having malignant or benign cancer.In this paper the classification of cancer type and prediction of risk levels is done by various model of machine learning and is pictorially depicted by various tools of visual analytics.
This paper presents a review & performs a comparative evaluation of few known machine learning
algorithms in terms of their suitability & code performance on any given data set of any size. In this paper,
we describe our Machine Learning ToolBox that we have built using python programming language. The
algorithms used in the toolbox consists of supervised classification algorithms such as Naïve Bayes,
Decision Trees, SVM, K-nearest Neighbors and Neural Network (Backpropagation). The algorithms are
tested on iris and diabetes dataset and are compared on the basis of their accuracy under different
conditions. However using our tool one can apply any of the implemented ML algorithms on any dataset of
any size. The main goal of building a toolbox is to provide users with a platform to test their datasets on
different Machine Learning algorithms and use the accuracy results to determine which algorithms fits the
data best. The toolbox allows the user to choose a dataset of his/her choice either in structured or
unstructured form and then can choose the features he/she wants to use for training the machine We have
given our concluding remarks on the performance of implemented algorithms based on experimental
analysis
A Threshold fuzzy entropy based feature selection method applied in various b...IJMER
Large amount of data have been stored and manipulated using various database
technologies. Processing all the attributes for the particular means is the difficult task. To avoid such
difficulties, feature selection process is processed.In this paper,we are collect a eight various benchmark
datasets from UCI repository.Feature selection process is carried out using fuzzy entropy based
relevance measure algorithm and follows three selection strategies like Mean selection strategy,Half
selection strategy and Neural network for threshold selection strategy. After the features are selected,
they are evaluated using Radial Basis Function (RBF) network,Stacking,Bagging,AdaBoostM1 and Antminer
classification methodologies.The test results depicts that Neural network for threshold selection
strategy works well in selecting features and Ant-miner methodology works best in bringing out better
accuracy with selected feature than processing with original dataset.The obtained result of this
experiment shows that clearly the Ant-miner is superiority than other classifiers.Thus, this proposed Antminer
algorithm could be a more suitable method for producing good results with fewer features than
the original datasets.
Performance Comparision of Machine Learning AlgorithmsDinusha Dilanka
In this paper Compare the performance of two
classification algorithm. I t is useful to differentiate
algorithms based on computational performance rather
than classification accuracy alone. As although
classification accuracy between the algorithms is similar,
computational performance can differ significantly and it
can affect to the final results. So the objective of this paper
is to perform a comparative analysis of two machine
learning algorithms namely, K Nearest neighbor,
classification and Logistic Regression. In this paper it
was considered a large dataset of 7981 data points and 112
features. Then the performance of the above mentioned
machine learning algorithms are examined. In this paper
the processing time and accuracy of the different machine
learning techniques are being estimated by considering the
collected data set, over a 60% for train and remaining
40% for testing. The paper is organized as follows. In
Section I, introduction and background analysis of the
research is included and in section II, problem statement.
In Section III, our application and data analyze Process,
the testing environment, and the Methodology of our
analysis are being described briefly. Section IV comprises
the results of two algorithms. Finally, the paper concludes
with a discussion of future directions for research by
eliminating the problems existing with the current
research methodology.
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETEditor IJMTER
Data mining environment produces a large amount of data that need to be analyzed.
Using traditional databases and architectures, it has become difficult to process, manage and analyze
patterns. To gain knowledge about the Big Data a proper architecture should be understood.
Classification is an important data mining technique with broad applications to classify the various
kinds of data used in nearly every field of our life. Classification is used to classify the item
according to the features of the item with respect to the predefined set of classes. This paper put a
light on various classification algorithms including j48, C4.5, Naive Bayes using large dataset.
A large number of techniques has been developed so far to tell the diversity of machine learning. Machine learning is categorized into supervised, unsupervised and reinforcement learning .Every instance in given data-set used by Machine learning algorithms is represented same set of features .On basis of label of instances it is divided into category. In this review paper our main focus is on Supervised, unsupervised learning techniques and its performance parameters.
This presentation is here to help you understand about Machine Learning, supervised Learning, Process Flow chat of Supervised Learning and 2 steps of supervised Learning.
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINERIJCSEA Journal
Comparison study of algorithms is very much required before implementing them for the needs of any
organization. The comparisons of algorithms are depending on the various parameters such as data
frequency, types of data and relationship among the attributes in a given data set. There are number of
learning and classifications algorithms are used to analyse, learn patterns and categorize data are
available. But the problem is the one to find the best algorithm according to the problem and desired
output. The desired result has always been higher accuracy in predicting future values or events from the
given dataset. Algorithms taken for the comparisons study are Neural net, SVM, Naïve Bayes, BFT and
Decision stump. These top algorithms are most influential data mining algorithms in the research
community. These algorithms have been considered and mostly used in the field of knowledge discovery
and data mining.
Selecting the Right Type of Algorithm for Various Applications - PhdassistancePhD Assistance
Machine learning algorithms may be classified mainly into three main types. Supervised learning constructs a mathematical model from the training data, including input and output labels. The techniques of data categorization and regression are deemed supervised learning. In unsupervised learning, the system constructs a model using just the input characteristics but no output labeling. The classifiers are then trained to search the dataset for a specific pattern.
Learn More:https://bit.ly/3sX9xuQ
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
Selecting the Right Type of Algorithm for Various Applications - PhdassistancePhD Assistance
Machine learning algorithms may be classified mainly into three main types. Supervised learning constructs a mathematical model from the training data, including input and output labels. The techniques of data categorization and regression are deemed supervised learning. In unsupervised learning, the system constructs a model using just the input characteristics but no output labeling. The classifiers are then trained to search the dataset for a specific pattern.
Learn More:https://bit.ly/3sX9xuQ
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
Paper Annotated: SinGAN-Seg: Synthetic Training Data Generation for Medical I...Devansh16
YouTube video: https://www.youtube.com/watch?v=Ao-19L0sLOI
SinGAN-Seg: Synthetic Training Data Generation for Medical Image Segmentation
Vajira Thambawita, Pegah Salehi, Sajad Amouei Sheshkal, Steven A. Hicks, Hugo L.Hammer, Sravanthi Parasa, Thomas de Lange, Pål Halvorsen, Michael A. Riegler
Processing medical data to find abnormalities is a time-consuming and costly task, requiring tremendous efforts from medical experts. Therefore, Ai has become a popular tool for the automatic processing of medical data, acting as a supportive tool for doctors. AI tools highly depend on data for training the models. However, there are several constraints to access to large amounts of medical data to train machine learning algorithms in the medical domain, e.g., due to privacy concerns and the costly, time-consuming medical data annotation process. To address this, in this paper we present a novel synthetic data generation pipeline called SinGAN-Seg to produce synthetic medical data with the corresponding annotated ground truth masks. We show that these synthetic data generation pipelines can be used as an alternative to bypass privacy concerns and as an alternative way to produce artificial segmentation datasets with corresponding ground truth masks to avoid the tedious medical data annotation process. As a proof of concept, we used an open polyp segmentation dataset. By training UNet++ using both the real polyp segmentation dataset and the corresponding synthetic dataset generated from the SinGAN-Seg pipeline, we show that the synthetic data can achieve a very close performance to the real data when the real segmentation datasets are large enough. In addition, we show that synthetic data generated from the SinGAN-Seg pipeline improving the performance of segmentation algorithms when the training dataset is very small. Since our SinGAN-Seg pipeline is applicable for any medical dataset, this pipeline can be used with any other segmentation datasets.
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
Cite as: arXiv:2107.00471 [eess.IV]
(or arXiv:2107.00471v1 [eess.IV] for this version)
Reach out to me:
Check out my other articles on Medium. : https://machine-learning-made-simple....
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn: https://www.linkedin.com/in/devansh-d...
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
IMAGE CLASSIFICATION USING DIFFERENT CLASSICAL APPROACHESVikash Kumar
IMAGE CLASSIFICATION USING KNN, RANDOM FOREST AND SVM ALGORITHM ON GLAUCOMA DATASETS AND EXPLAIN THE ACCURACY, SENSITIVITY, AND SPECIFICITY OF EACH AND EVERY ALGORITHMS
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
Abstract- The goal of this paper is to compare between different classifiers or multi-classifiers fusion with respect to accuracy in discovering breast cancer for four different data sets. We present an implementation among various classification techniques which represent the most known algorithms in this field on four different datasets of breast cancer two for diagnosis and two for prognosis. We present a fusion between classifiers to get the best multi-classifier fusion approach to each data set individually. By using confusion matrix to get classification accuracy which built in 10-fold cross validation technique. Also, using fusion majority voting (the mode of the classifier output). The experimental results show that no classification technique is better than the other if used for all datasets, since the classification task is affected by the type of dataset. By using multi-classifiers fusion the results show that accuracy improved in three datasets out of four.
A Magnified Application of Deficient Data Using Bolzano Classifierjournal ijrtem
Abstract: Deficient and Inconsistent knowledge are a pervasive and lasting problem in heavy information sets. However, basic accusation is attractive often used to impute missing data, whereas multiple imputation generates right value to replace. Consequently, variety of machine learning (ML) techniques are developed to reprocess the incomplete information. It is estimated multiple imputation of missing information in large datasets and the performance of MI focuses on several unsupervised ML algorithms like mean, median, standard deviation and Supervised ML techniques for probabilistic algorithm like NBI classifier. Such research is carried out employing a comprehensive range of databases, for which missing cases are first filled in by various sets of plausible values to create multiple completed datasets, then standard complete- data operations are applied to each completed dataset, and finally the multiple sets of results combine to generate a single inference. The main aim of this report is to offer general guidelines for selection of suitable data imputation algorithms based on characteristics of the data. Implementing Bolzano Weierstrass theorem in machine learning techniques to assess the functioning of every sequence of rational and irrational number has a monotonic subsequence and specify every sequence always has a finite boundary. For estimate imputation of missing data, the standard machine learning repository dataset has been applied. Tentative effects manifest the proposed approach to have good accuracy and the accuracy measured in terms of percent. Keywords: Bolzano Classifier, Maximum Likelihood, NBI classifier, posterior probability, predictor probability, prior probability, Supervised ML, Unsupervised ML.
Myanmar 's largest marketplace for health and beauty merchandise to shop for Union of Burma ancient medicines, myanmar hair, Union of Burma article of clothing, myanmar dresses, Union of Burma ancient dresses etc. you'll be able to directly take care of Myanmar Suppliers via BaganTrade platform.
Simplified Knowledge Prediction: Application of Machine Learning in Real LifePeea Bal Chakraborty
Machine learning is the scientific study of algorithms and statistical models that is used by the machines to perform a specific task depending on patterns and inference rather than explicit instructions. This research and analysis aims to observe how precisely a machine can predict that a patient suspected of breast cancer is having malignant or benign cancer.In this paper the classification of cancer type and prediction of risk levels is done by various model of machine learning and is pictorially depicted by various tools of visual analytics.
This paper presents a review & performs a comparative evaluation of few known machine learning
algorithms in terms of their suitability & code performance on any given data set of any size. In this paper,
we describe our Machine Learning ToolBox that we have built using python programming language. The
algorithms used in the toolbox consists of supervised classification algorithms such as Naïve Bayes,
Decision Trees, SVM, K-nearest Neighbors and Neural Network (Backpropagation). The algorithms are
tested on iris and diabetes dataset and are compared on the basis of their accuracy under different
conditions. However using our tool one can apply any of the implemented ML algorithms on any dataset of
any size. The main goal of building a toolbox is to provide users with a platform to test their datasets on
different Machine Learning algorithms and use the accuracy results to determine which algorithms fits the
data best. The toolbox allows the user to choose a dataset of his/her choice either in structured or
unstructured form and then can choose the features he/she wants to use for training the machine We have
given our concluding remarks on the performance of implemented algorithms based on experimental
analysis
A Threshold fuzzy entropy based feature selection method applied in various b...IJMER
Large amount of data have been stored and manipulated using various database
technologies. Processing all the attributes for the particular means is the difficult task. To avoid such
difficulties, feature selection process is processed.In this paper,we are collect a eight various benchmark
datasets from UCI repository.Feature selection process is carried out using fuzzy entropy based
relevance measure algorithm and follows three selection strategies like Mean selection strategy,Half
selection strategy and Neural network for threshold selection strategy. After the features are selected,
they are evaluated using Radial Basis Function (RBF) network,Stacking,Bagging,AdaBoostM1 and Antminer
classification methodologies.The test results depicts that Neural network for threshold selection
strategy works well in selecting features and Ant-miner methodology works best in bringing out better
accuracy with selected feature than processing with original dataset.The obtained result of this
experiment shows that clearly the Ant-miner is superiority than other classifiers.Thus, this proposed Antminer
algorithm could be a more suitable method for producing good results with fewer features than
the original datasets.
Performance Comparision of Machine Learning AlgorithmsDinusha Dilanka
In this paper Compare the performance of two
classification algorithm. I t is useful to differentiate
algorithms based on computational performance rather
than classification accuracy alone. As although
classification accuracy between the algorithms is similar,
computational performance can differ significantly and it
can affect to the final results. So the objective of this paper
is to perform a comparative analysis of two machine
learning algorithms namely, K Nearest neighbor,
classification and Logistic Regression. In this paper it
was considered a large dataset of 7981 data points and 112
features. Then the performance of the above mentioned
machine learning algorithms are examined. In this paper
the processing time and accuracy of the different machine
learning techniques are being estimated by considering the
collected data set, over a 60% for train and remaining
40% for testing. The paper is organized as follows. In
Section I, introduction and background analysis of the
research is included and in section II, problem statement.
In Section III, our application and data analyze Process,
the testing environment, and the Methodology of our
analysis are being described briefly. Section IV comprises
the results of two algorithms. Finally, the paper concludes
with a discussion of future directions for research by
eliminating the problems existing with the current
research methodology.
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETEditor IJMTER
Data mining environment produces a large amount of data that need to be analyzed.
Using traditional databases and architectures, it has become difficult to process, manage and analyze
patterns. To gain knowledge about the Big Data a proper architecture should be understood.
Classification is an important data mining technique with broad applications to classify the various
kinds of data used in nearly every field of our life. Classification is used to classify the item
according to the features of the item with respect to the predefined set of classes. This paper put a
light on various classification algorithms including j48, C4.5, Naive Bayes using large dataset.
A large number of techniques has been developed so far to tell the diversity of machine learning. Machine learning is categorized into supervised, unsupervised and reinforcement learning .Every instance in given data-set used by Machine learning algorithms is represented same set of features .On basis of label of instances it is divided into category. In this review paper our main focus is on Supervised, unsupervised learning techniques and its performance parameters.
This presentation is here to help you understand about Machine Learning, supervised Learning, Process Flow chat of Supervised Learning and 2 steps of supervised Learning.
ANALYSIS AND COMPARISON STUDY OF DATA MINING ALGORITHMS USING RAPIDMINERIJCSEA Journal
Comparison study of algorithms is very much required before implementing them for the needs of any
organization. The comparisons of algorithms are depending on the various parameters such as data
frequency, types of data and relationship among the attributes in a given data set. There are number of
learning and classifications algorithms are used to analyse, learn patterns and categorize data are
available. But the problem is the one to find the best algorithm according to the problem and desired
output. The desired result has always been higher accuracy in predicting future values or events from the
given dataset. Algorithms taken for the comparisons study are Neural net, SVM, Naïve Bayes, BFT and
Decision stump. These top algorithms are most influential data mining algorithms in the research
community. These algorithms have been considered and mostly used in the field of knowledge discovery
and data mining.
Selecting the Right Type of Algorithm for Various Applications - PhdassistancePhD Assistance
Machine learning algorithms may be classified mainly into three main types. Supervised learning constructs a mathematical model from the training data, including input and output labels. The techniques of data categorization and regression are deemed supervised learning. In unsupervised learning, the system constructs a model using just the input characteristics but no output labeling. The classifiers are then trained to search the dataset for a specific pattern.
Learn More:https://bit.ly/3sX9xuQ
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
Selecting the Right Type of Algorithm for Various Applications - PhdassistancePhD Assistance
Machine learning algorithms may be classified mainly into three main types. Supervised learning constructs a mathematical model from the training data, including input and output labels. The techniques of data categorization and regression are deemed supervised learning. In unsupervised learning, the system constructs a model using just the input characteristics but no output labeling. The classifiers are then trained to search the dataset for a specific pattern.
Learn More:https://bit.ly/3sX9xuQ
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
Paper Annotated: SinGAN-Seg: Synthetic Training Data Generation for Medical I...Devansh16
YouTube video: https://www.youtube.com/watch?v=Ao-19L0sLOI
SinGAN-Seg: Synthetic Training Data Generation for Medical Image Segmentation
Vajira Thambawita, Pegah Salehi, Sajad Amouei Sheshkal, Steven A. Hicks, Hugo L.Hammer, Sravanthi Parasa, Thomas de Lange, Pål Halvorsen, Michael A. Riegler
Processing medical data to find abnormalities is a time-consuming and costly task, requiring tremendous efforts from medical experts. Therefore, Ai has become a popular tool for the automatic processing of medical data, acting as a supportive tool for doctors. AI tools highly depend on data for training the models. However, there are several constraints to access to large amounts of medical data to train machine learning algorithms in the medical domain, e.g., due to privacy concerns and the costly, time-consuming medical data annotation process. To address this, in this paper we present a novel synthetic data generation pipeline called SinGAN-Seg to produce synthetic medical data with the corresponding annotated ground truth masks. We show that these synthetic data generation pipelines can be used as an alternative to bypass privacy concerns and as an alternative way to produce artificial segmentation datasets with corresponding ground truth masks to avoid the tedious medical data annotation process. As a proof of concept, we used an open polyp segmentation dataset. By training UNet++ using both the real polyp segmentation dataset and the corresponding synthetic dataset generated from the SinGAN-Seg pipeline, we show that the synthetic data can achieve a very close performance to the real data when the real segmentation datasets are large enough. In addition, we show that synthetic data generated from the SinGAN-Seg pipeline improving the performance of segmentation algorithms when the training dataset is very small. Since our SinGAN-Seg pipeline is applicable for any medical dataset, this pipeline can be used with any other segmentation datasets.
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
Cite as: arXiv:2107.00471 [eess.IV]
(or arXiv:2107.00471v1 [eess.IV] for this version)
Reach out to me:
Check out my other articles on Medium. : https://machine-learning-made-simple....
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn: https://www.linkedin.com/in/devansh-d...
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
IMAGE CLASSIFICATION USING DIFFERENT CLASSICAL APPROACHESVikash Kumar
IMAGE CLASSIFICATION USING KNN, RANDOM FOREST AND SVM ALGORITHM ON GLAUCOMA DATASETS AND EXPLAIN THE ACCURACY, SENSITIVITY, AND SPECIFICITY OF EACH AND EVERY ALGORITHMS
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
Abstract- The goal of this paper is to compare between different classifiers or multi-classifiers fusion with respect to accuracy in discovering breast cancer for four different data sets. We present an implementation among various classification techniques which represent the most known algorithms in this field on four different datasets of breast cancer two for diagnosis and two for prognosis. We present a fusion between classifiers to get the best multi-classifier fusion approach to each data set individually. By using confusion matrix to get classification accuracy which built in 10-fold cross validation technique. Also, using fusion majority voting (the mode of the classifier output). The experimental results show that no classification technique is better than the other if used for all datasets, since the classification task is affected by the type of dataset. By using multi-classifiers fusion the results show that accuracy improved in three datasets out of four.
A Magnified Application of Deficient Data Using Bolzano Classifierjournal ijrtem
Abstract: Deficient and Inconsistent knowledge are a pervasive and lasting problem in heavy information sets. However, basic accusation is attractive often used to impute missing data, whereas multiple imputation generates right value to replace. Consequently, variety of machine learning (ML) techniques are developed to reprocess the incomplete information. It is estimated multiple imputation of missing information in large datasets and the performance of MI focuses on several unsupervised ML algorithms like mean, median, standard deviation and Supervised ML techniques for probabilistic algorithm like NBI classifier. Such research is carried out employing a comprehensive range of databases, for which missing cases are first filled in by various sets of plausible values to create multiple completed datasets, then standard complete- data operations are applied to each completed dataset, and finally the multiple sets of results combine to generate a single inference. The main aim of this report is to offer general guidelines for selection of suitable data imputation algorithms based on characteristics of the data. Implementing Bolzano Weierstrass theorem in machine learning techniques to assess the functioning of every sequence of rational and irrational number has a monotonic subsequence and specify every sequence always has a finite boundary. For estimate imputation of missing data, the standard machine learning repository dataset has been applied. Tentative effects manifest the proposed approach to have good accuracy and the accuracy measured in terms of percent. Keywords: Bolzano Classifier, Maximum Likelihood, NBI classifier, posterior probability, predictor probability, prior probability, Supervised ML, Unsupervised ML.
Myanmar 's largest marketplace for health and beauty merchandise to shop for Union of Burma ancient medicines, myanmar hair, Union of Burma article of clothing, myanmar dresses, Union of Burma ancient dresses etc. you'll be able to directly take care of Myanmar Suppliers via BaganTrade platform.
Machine Learning Interview Questions and AnswersSatyam Jaiswal
Practice Best Machine Learning Interview Questions and Answers for the best preparation of the machine learning interview. these questions are very popular and asked various times in machine learning interview.
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...IAEME Publication
Close range photogrammetry network design is referred to the process of placing a set of
cameras in order to achieve photogrammetric tasks. The main objective of this paper is tried to find
the best location of two/three camera stations. The genetic algorithm optimization and Particle
Swarm Optimization are developed to determine the optimal camera stations for computing the three
dimensional coordinates. In this research, a mathematical model representing the genetic algorithm
optimization and Particle Swarm Optimization for the close range photogrammetry network is
developed. This paper gives also the sequence of the field operations and computational steps for this
task. A test field is included to reinforce the theoretical aspects.
A chi-square-SVM based pedagogical rule extraction method for microarray data...IJAAS Team
Support Vector Machine (SVM) is currently an efficient classification technique due to its ability to capture nonlinearities in diagnostic systems, but it does not reveal the knowledge learnt during training. It is important to understand of how a decision is reached in the machine learning technology, such as bioinformatics. On the other hand, a decision tree has good comprehensibility; the process of converting such incomprehensible models into an understandable model is often regarded as rule extraction. In this paper we proposed an approach for extracting rules from SVM for microarray dataset by combining the merits of both the SVM and decision tree. The proposed approach consists of three steps; the SVM-CHI-SQUARE is employed to reduce the feature set. Dataset with reduced features is used to obtain SVM model and synthetic data is generated. Classification and Regression Tree (CART) is used to generate Rules as the Last phase. We use breast masses dataset from UCI repository where comprehensibility is a key requirement. From the result of the experiment as the reduced feature dataset is used, the proposed approach extracts smaller length rules, thereby improving the comprehensibility of the system. We obtained accuracy of 93.53%, sensitivity of 89.58%, specificity of 96.70%, and training time of 3.195 seconds. A comparative analysis is carried out done with other algorithms.
Optimization is considered to be one of the pillars of statistical learning and also plays a major role in the design and development of intelligent systems such as search engines, recommender systems, and speech and image recognition software. Machine Learning is the study that gives the computers the ability to learn and also the ability to think without being explicitly programmed. A computer is said to learn from an experience with respect to a specified task and its performance related to that task. The machine learning algorithms are applied to the problems to reduce efforts. Machine learning algorithms are used for manipulating the data and predict the output for the new data with high precision and low uncertainty. The optimization algorithms are used to make rational decisions in an environment of uncertainty and imprecision. In this paper a methodology is presented to use the efficient optimization algorithm as an alternative for the gradient descent machine learning algorithm as an optimization algorithm.
With the increase in Internet users the number of malicious users are also growing day-by-day posing a
serious problem in distinguishing between normal and abnormal behavior of users in the network. This
has led to the research area of intrusion detection which essentially analyzes the network traffic and tries
to determine normal and abnormal patterns of behavior.In this paper, we have analyzed the standard
NSL-KDD intrusion dataset using some neural network based techniques for predicting possible
intrusions. Four most effective classification methods, namely, Radial Basis Function Network, Self-
Organizing Map, Sequential Minimal Optimization, and Projective Adaptive Resonance Theory have been
applied. In order to enhance the performance of the classifiers, three entropy based feature selection
methods have been applied as preprocessing of data. Performances of different combinations of classifiers
and attribute reduction methods have also been compared.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A new model for iris data set classification based on linear support vector m...IJECEIAES
Data mining is known as the process of detection concerning patterns from essential amounts of data. As a process of knowledge discovery. Classification is a data analysis that extracts a model which describes an important data classes. One of the outstanding classifications methods in data mining is support vector machine classification (SVM). It is capable of envisaging results and mostly effective than other classification methods. The SVM is a one technique of machine learning techniques that is well known technique, learning with supervised and have been applied perfectly to a vary problems of: regression, classification, and clustering in diverse domains such as gene expression, web text mining. In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
The purpose of this paper is to describe two objective fuzzy genetics-based learning algorithms
and discusses its usage to detect intrusion in a computer network. Experiments were performed
with KDD-cup data set, which have information on computer networks, during normal behavior
and intrusive behavior. The performance of final fuzzy classification system has been
investigated using intrusion detection problem as a high dimensional classification problem.
This task is formulated as optimization problem with two objectives: To minimize the number of
fuzzy rules and to maximize the classification rate. We show a two-objective genetic algorithm
for finding non-dominated solutions of the fuzzy rule selection problem
Machine Learning Algorithm for Business Strategy.pdfPhD Assistance
Many algorithms are based on the idea that classes can be divided along a straight line (or its higher-dimensional analog). Support vector machines and logistic regression are two examples.
For #Enquiry:
Website: https://www.phdassistance.com/blog/a-simple-guide-to-assist-you-in-selecting-the-best-machine-learning-algorithm-for-business-strategy/
India: +91 91769 66446
Email: info@phdassistance.com
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
With the increase in Internet users the number of malicious users are also growing day-by-day posing a serious problem in distinguishing between normal and abnormal behavior of users in the network. This has led to the research area of intrusion detection which essentially analyzes the network traffic and tries to determine normal and abnormal patterns of behavior.In this paper, we have analyzed the standard NSL-KDD intrusion dataset using some neural network based techniques for predicting possible intrusions. Four most effective classification methods, namely, Radial Basis Function Network, SelfOrganizing Map, Sequential Minimal Optimization, and Projective Adaptive Resonance Theory have been applied. In order to enhance the performance of the classifiers, three entropy based feature selection methods have been applied as preprocessing of data. Performances of different combinations of classifiers and attribute reduction methods have also been compared.
2. The applicability of the ANN is for the
classification and reorganization of the data.
However, for reorganization and classification, the
ANN needs a large dataset. In order to optimize this
type of data and for generating and making a pattern
or feature, the ANN needs a special system or
algorithm to overcome such problems. This study
aims to propose the application of GA to improve the
ANN mechanism. Besides, in this study, GA will be
used to overcome this problem [8].
One of the most popular methods of machine
learning is Support Vector Machine (SVM) and it has
been applied to solve the regression and classification
problems. For each one of the given input data, the
SVM takes a series of input data and predicts that the
output is formed by which one of two probable classes
(it is also known as the binary linear classifier). Given
a set of training examples, each marked as belonging
to one of two categories (Attack or Normal). In the
attack detection, the SVM is responsible of predicting
if the new data falls into the category of normal data
or the attack group [9].
The SVM is helpful in reorganizing and
classifying the data. However, for classification and
reorganization, a large data set is required by SVM
[10]. For optimizing this data type and for making and
generating a feature pattern, a special algorithm or
system is required by SVM for overcoming such
problems. This study has proposes to apply the GA
for improving the mechanism of SVM. In addition,
this study intends to utilize the GA for overcoming
this problem [11].
GA is one of the most used and most popular
algorithms for the machine learning. It is an adaptive
and exploratory algorithm for search and work that
has been based upon the evolutionary ideas of natural
genetics [12]. The GA generates the primary
individual population with a quality in a high level of
the individuals. Besides, each one of these individuals
represents a solution for the problem [13]. GA is
known as a parallel algorithm and it can find a
solution for a problem with many subsets, thus, this
algorithm is a proper algorithm to be used for IDS.
Genetic algorithm is capable of simultaneously
finding and searching for solutions in various problem
subsets. Moreover, the GA has no mathematical
derivation and it is capable of reaching to the roper
solution sets for the problems. In addition, GA can
propose a solution in a single solution that its value is
optimal. Besides, the GA is capable of recognizing the
new data or attacks from the previous ones and it is
considered as a suitable method for the intrusion
detection systems, particularly for detecting the
attacks, which are based upon the human behavior
[14].
In the machine learning field, the process of
selecting a set or a subset in a related feature for
making a solution model is known as the feature
selection. When the feature is in use, the assumption
is that there are redundant and irrelevant information
included in the data. Thus, in machine learning and to
overcome this problem, the feature selection
algorithm is used by the researchers to select the
relevant and useful information [15].
II. RELATED WORK
In the previous studies, the researchers have tried
to solve this problem by using different methods such
as LCFS, FFSA and MMIFS [16], fuzzy rule based
[17], SVM Classification, GA optimization [18],
ANN Classification [19], GA optimization and four-
angle-star [20]. Table 1 illustrate of these methods in
brief.
TABLE I. PREVIOUS WORK
Author Method objective
Bin Luo et
al.
four-angle-star based visualized feature
generation approach, (FASVFG)
evaluate the distance
between samples in a 5-class
classification problem
Abraham et
al.
fuzzy rule based
classifiers
framework for Distributed
Intrusion Detection Systems
(DIDS)
Amiri et al. Forward feature selection algorithm(FFSA)
Liner correlation feature selection (LCFS)
Modified mutual information feature
selection (MMIFS)
Propose a feature selection
phase, which can be
generally implemented on
any intrusion detection
Li et al. Ant colony algorithm and support vector
machine (SVM)
This paper proposes a
desirable IDS model with
high efficiency and accuracy
Dastanpour
et al.
Propose a feature selection based on the
genetic algorithm and support vector
machine
Improve detection rate with
the less number of features
Dastanpour
et al.
Applying Genetic Algorithms (GA) with
Artificial Neural Networks classifier to
detect the attacks in network
Increase of accuracy with the
optimal number of features
2014 IEEE Conference on Open Systems (ICOS), October 26-28, 2014, Subang, Malaysia
73
3. III. DATA ANALYSIS
In this study, theKnowledge Discovery and Data
Mining(KDD CUP 1999) has been applied for the
data set. This dataset has been used due to its
comprehensiveness. It is also the best dataset to
investigate one’s IDS performance. There are 22
attack types included in this dataset [21] and they can
be classified into 4 groups [22]: probing, U2R, R2L,
and DOS with the following details [23]:
Probing: surveillance and other probing: the
network is scanned by this attack type of data
collection about the targeted host.
U2R: unauthorized access to privileges of the root
(local super user). This attack is known as the attacks
in which the attacker can access the system and can
exploit the vulnerabilities to gain the key permissions.
R2L: unauthorized access from a remote machine.
In this attack type, some packets are sent in the
network for achieving the network accessibility as a
known and local user.
DOS: denial of service. This attack type is applied
to user behavior understanding. This attack type
requires spending some computing resources and
memory.
IV. METHODOLOGY
In Fig.1, the main idea of the study and the entire
method has been illustrated. First, in this method, the
dataset will be dived in a random pattern into 2
groups, the training set and the testing set. In the
training phase, the 1st task of the machine learning is
leaning and selecting the most proper features and
then in the testing phase, the machine learning
knowledge is tested by the machine learning and the
selected features in the training phase are also tested
and after that the data is categorized into the two
groups, the attacks and the normal data. In the
machine learning process, the SVM and ANN receive
the data and then the both of the SVM and ANN are
used by the system for classifying the training data.
Then the SVM and ANN are ready to be applied in
the training set of the system. After all, when each of
these algorithm classifier of testing data the result of
detection or classification pass to the GA for
optimization or improvement of each algorithm for
high reorganization [24]. In other words, when the
classification of SVM and ANN are finished, the
classification of each algorithm is improved by GA
for achieving high detection.
FIGURE 1. OVERALL METHOD OF THIS PAPER
The GA is a method in which the global
optimization is searched and it is able to simulate the
behavior and the process of the evolution in the
nature. It means that each key that may be possible
will be trained in a vector type that is known as the
chromosome. Each one of the vector elements is a
representative of a gene. A population will be formed
by the whole set of the chromosomes and the
population projection is based upon the function of
the fitness [25]. For measuring the chromosome
fitness, a fitness value is used. The genetic process
primary populations are developed randomly. The
operators are applied by the GA to create the next
generation out of the current generation: mutation,
crossover, and reproduction. The chromosomes that
have lower fitness are omitted by the GA. Besides, the
GA prevents the chromosomes with high fitness [26].
All the aforementioned process will be repeated and
as a result, more chromosomes will be received by the
next generation with high fitness. This process will be
continued until an individual proper chromosome is
detected [27]. A primary individual set is turned into
the individuals with high quality by the GA and each
individual that has been achieved can operate as one
solution. The above mentioned individuals are known
as the chromosomes and some pre-determined genes
are the elements that form those chromosomes [28].
2014 IEEE Conference on Open Systems (ICOS), October 26-28, 2014, Subang, Malaysia
74
4. V. EXPERIMENTAL RESULT
In this paper, the SVM and ANN are first used for
the classification and recognition of the data in
groups: normal and attack. Then the genetic algorithm
was used to optimize the recognized data by SVM and
ANN. In this study, the GA optimization means the
improvement of the classification of each method for
FIGURE
FIGURE
FIGURE 4.
98
98.5
99
99.5
100
1 3 5 7 9 11
DetectionRaate(%)
99.93
99.94
99.95
99.96
99.97
99.98
99.99
100
1 3 5 7 9 11 13
DetectionRate(%)
98
98.5
99
99.5
100
1 3 5 7 9 11 13
DetectionRate(%)
RESULT
In this paper, the SVM and ANN are first used for
the classification and recognition of the data into two
groups: normal and attack. Then the genetic algorithm
was used to optimize the recognized data by SVM and
ANN. In this study, the GA optimization means the
improvement of the classification of each method for
the percentage of classification and recog
GA and ANN results are shown in
and SVM results are indicated in
effectiveness of the GA on the classification methods
is illustrated. In table 2 the comparison between the
effect of GA on SVM and ANN with
algorithms applied in the intrusion detection is
illustrated.
IGURE 2. RESULT OF DETECTION RATE FOR ANN WITH GA
IGURE 3. RESULT OF DETECTION RATE FOR SVM WITH GA
RESULT OF COMPARING ANN WITH GA AND SVM WITH GA
13 15 17 19 21 23 25 27 29 31 33 35 37 39 41
Number Of Feature
13 15 17 19 21 23 25 27 29 31 33 35 37 39 41
Number Of Feature
13 15 17 19 21 23 25 27 29 31 33 35 37 39 41
Number Of Feature
the percentage of classification and recognition. The
GA and ANN results are shown in Fig.2 and the GA
and SVM results are indicated in Fig.3. In Fig.4, the
effectiveness of the GA on the classification methods
illustrated. In table 2 the comparison between the
effect of GA on SVM and ANN with the other
algorithms applied in the intrusion detection is
41
GA- ANN
GA-SVM
GA - SVM
GA - ANN
2014 IEEE Conference on Open Systems (ICOS), October 26-28, 2014, Subang, Malaysia
75
5. TABLE II. COMPARATIVE OF GA ON ANN AND SVM WITH
OTHER ALGORITHM
Name of algorithm Detection rate Number of
Feature
LCFS 100 % 21
FFSA 100 % 31
MMIFS 100 % 24
fuzzy rule based 100 % 41
FASVFG 94 % 20
SVM With GA 100 % 24
ANN with GA 100 % 18
The comparison indicates that the GA with ANN
will result in a better performance with a lower
number of features. When the GA and SVM are
compared with GA and ANN, it can be recognized
that the GA the effectiveness of the GA is higher on
ANN than SVM. Although high detection rates can be
achieved by the other algorithms, GA and ANN can
reach a high detection rate with a lower number of
features.
VI. CONCLUSION
In this study GA has been proposed for producing
the detection features. Then the SVM and ANN are
used for the detection system classifier and comparing
with each other to show the effectiveness of the GA
on these methods. The outcomes show that in
comparison with the other methods, the highest
detection rate is obtained by the GA with ANN. In
this study, a series of experiments was conducted by
applying the KDD cup 99 dataset for the detection of
four categories of network attacks. The feature
selection that has been based upon the GA with the
ANN classification shows more proper detection rates
in the proposed intrusion detection system. In order to
detect the attacks efficiently, the GA with SVM
requires 24 features and GA with ANN needs 18 for
achieving 100% of detection. In the future work, it has
been planned that the other methods of classification
be employed with GA. In addition, their effectiveness
is planned to be explored in the network attack
detection.
VII. ACKNOWLEDGEMENT
This research is funded by the Research University
grant of UniversityTechnology Malaysia (UTM)
under the Vot no. 08H28. The authors would like to
thank the Research Management Centre of UTM and
the Malaysian ministry of education for their support
and cooperation including students and other
individuals who are either directly or indirectly
involved in this project.
VIII. REFRENCES
[1] S. X. Wu and W. Banzhaf, "The use of computational
intelligence in intrusion detection systems: A review,"
Applied Soft Computing, vol. 10, pp. 1-35, 2010.
[2] A. Simmonds, P. Sandilands, and L. Van Ekert, "An
ontology for network security attacks," in Applied
Computing, ed: Springer, 2004, pp. 317-323.
[3] A. Tamilarasan, S. Mukkamala, A. H. Sung, and K.
Yendrapalli, "Feature ranking and selection for intrusion
detection using artificial neural networks and statistical
methods," in Neural Networks, 2006. IJCNN'06.
International Joint Conference on, 2006, pp. 4754-4761.
[4] V. T. Goh, J. Zimmermann, and M. Looi, "Towards intrusion
detection for encrypted networks," in Availability, Reliability
and Security, 2009. ARES'09. International Conference on,
2009, pp. 540-545.
[5] M. S. Prasad, A. V. Babu, and M. K. B. Rao, "An Intrusion
Detection System Architecture Based on Neural Networks
and Genetic Algorithms," International Journal of Computer
Science and Management Research, vol. 2, 2013.
[6] E. Corchado and Á. Herrero, "Neural visualization of
network traffic data for intrusion detection," Applied Soft
Computing, vol. 11, pp. 2042-2056, 2011.
[7] O. Linda, T. Vollmer, and M. Manic, "Neural network based
intrusion detection system for critical infrastructures," in
Neural Networks, 2009. IJCNN 2009. International Joint
Conference on, 2009, pp. 1827-1834.
[8] A. Bivens, C. Palagiri, R. Smith, B. Szymanski, and M.
Embrechts, "Network-based intrusion detection using neural
networks," Intelligent Engineering Systems through Artificial
Neural Networks, vol. 12, pp. 579-584, 2002.
[9] S. Mukkamala, G. Janoski, and A. Sung, "Intrusion detection
using neural networks and support vector machines," in
Neural Networks, 2002. IJCNN'02. Proceedings of the 2002
International Joint Conference on, 2002, pp. 1702-1707.
[10] T. Shon, J. Seo, and J. Moon, "SVM approach with a genetic
algorithm for network intrusion detection," in Computer and
Information Sciences-ISCIS 2005, ed: Springer, 2005, pp.
224-233.
[11] D. S. Kim and J. S. Park, "Network-based intrusion detection
with support vector machines," in Information Networking,
2003, pp. 747-756.
[12] M. S. Hoque, M. Mukit, M. Bikas, and A. Naser, "An
implementation of intrusion detection system using genetic
algorithm," arXiv preprint arXiv:1204.1336, 2012.
[13] P. Gupta and S. K. Shinde, "Genetic algorithm technique
used to detect intrusion detection," in Advances in
Computing and Information Technology, ed: Springer, 2011,
pp. 122-131.
[14] W. Li, "Using genetic algorithm for network intrusion
detection," Proceedings of the United States Department of
Energy Cyber Security Group, pp. 1-8, 2004.
[15] G. G. Helmer, J. S. Wong, V. Honavar, and L. Miller,
"Intelligent agents for intrusion detection," in Information
Technology Conference, 1998. IEEE, 1998, pp. 121-124.
[16] F. Amiri, M. Rezaei Yousefi, C. Lucas, A. Shakery, and N.
Yazdani, "Mutual information-based feature selection for
intrusion detection systems," Journal of Network and
Computer Applications, vol. 34, pp. 1184-1199, 2011.
[17] A. Abraham, R. Jain, J. Thomas, and S. Y. Han, "D-SCIDS:
Distributed soft computing intrusion detection system,"
Journal of Network and Computer Applications, vol. 30, pp.
81-98, 2007.
[18] A. Dastanpour and R. A. R. Mahmood, "Feature Selection
Based on Genetic Algorithm and SupportVector Machine for
Intrusion Detection System," in The Second International
2014 IEEE Conference on Open Systems (ICOS), October 26-28, 2014, Subang, Malaysia
76
6. Conference on Informatics Engineering & Information
Science (ICIEIS2013), 2013, pp. 169-181.
[19] A. Dastanpour, S. Ibrahim, and R. Mashinchi, "Using
Genetic Algorithm to Supporting Artificial Neural Network
for Intrusion Detection System," in The International
Conference on Computer Security and Digital Investigation
(ComSec2014), 2014, pp. 1-13.
[20] B. Luo and J. Xia, "A novel intrusion detection system based
on feature generation with visualization strategy," Expert
Systems with Applications, 2014.
[21] M. K. Siddiqui and S. Naahid, "Analysis of KDD CUP 99
Dataset using Clustering based Data Mining," International
Journal of Database Theory & Application, vol. 6, 2013.
[22] L. M. L. de Campos, R. C. L. de Oliveira, and M.
Roisenberg, "Network Intrusion Detection System Using
Data Mining," in Engineering Applications of Neural
Networks, ed: Springer, 2012, pp. 104-113.
[23] I. Levin, "KDD-99 classifier learning contest: LLSoft's
results overview," SIGKDD explorations, vol. 1, pp. 67-75,
2000.
[24] S. Dhopte and M. Chaudhari, "Genetic Algorithm for
Intrusion Detection System."
[25] Y.-X. Meng, "The practice on using machine learning for
network anomaly intrusion detection," in Machine Learning
and Cybernetics (ICMLC), 2011 International Conference
on, 2011, pp. 576-581.
[26] H. Sarvari and M. M. Keikha, "Improving the accuracy of
intrusion detection systems by using the combination of
machine learning approaches," in Soft Computing and
Pattern Recognition (SoCPaR), 2010 International
Conference of, 2010, pp. 334-337.
[27] R. Sommer and V. Paxson, "Outside the closed world: On
using machine learning for network intrusion detection," in
Security and Privacy (SP), 2010 IEEE Symposium on, 2010,
pp. 305-316.
[28] M. H. Mashinchi, M. R. Mashinchi, and S. M. H.
Shamsuddin, "A Genetic Algorithm Approach for Solving
Fuzzy Linear and Quadratic Equations," World Academy of
Science, Engineering and Technology, vol. 28, 2007.
2014 IEEE Conference on Open Systems (ICOS), October 26-28, 2014, Subang, Malaysia
77