Search Results - (( basic optimization means algorithm ) OR ( learning classification protocol algorithm ))
Search alternatives:
- classification protocol »
- basic optimization »
- optimization means »
- protocol algorithm »
- means algorithm »
-
1
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article -
2
Basic firefly algorithm for document clustering
Published 2015“…Results demonstrate that the Basic FA generates a more robust and compact clusters than the ones produced by K-means and Particle Swarm Optimization (PSO).…”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024Subjects:Article -
5
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis -
6
-
7
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…It makes use of three basic operations in order to optimize this problem. …”
Get full text
Get full text
Thesis -
9
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Prediction of sleep pattern for university students using machine learning
Published 2026“…Data was collected through an online survey of 286 respondents, covering features related to demographics, daily habits, and personal perceptions. The Random Forest algorithm was employed for classification, evaluated using a 5-Fold Cross-Validation protocol, and achieved an average accuracy of 81.46%. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Cycle time minimization in production line using robust hybrid optimization algorithm
Published 2021“…As example, memetic algorithm, EGSJAABC3 is applied for economic environmental dispatch (EED) optimization, Hybrid Pareto Grey Wolf Optimization to minimize emission of noise and carbon in U-shaped robotic assembly line and Polar Bear Optimization to optimize heat production. …”
Get full text
Get full text
Conference or Workshop Item -
13
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. However, most of these studies utilized flow features with no feature transformation or relied on inefficient flow feature transformations like frequency-based periodicity analysis and outliers percentage. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
Get full text
Get full text
Article -
15
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…To evaluate the proposed algorithm, the solutions to the TSP problem obtained from the proposed algorithm and swap sequence based PSO are compared in terms of the best solution, mean solution, and time taken to converge to the optimal solution. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Artificial bee colony algorithm with proposed discrete nearest neighborhood algorithm for discrete optimization problems
Published 2021“…The proposed algorithm has been better than basic ABC in all tested problems with average of 0.570%.…”
Get full text
Get full text
Get full text
Article -
17
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
18
Classification of acute leukemia using image processing and machine learning techniques / Hayan Tareq Abdul Wahhab
Published 2015“…This combination resulted in a new algorithm we named CBCSA. Based on the Relative Ultimate Measurement Accuracy for Area, the proposed algorithm was able to achieve an accuracy of 96% and 94% in the extraction of the blast cell region and the nuclear region, respectively. …”
Get full text
Get full text
Thesis -
19
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Moreover, the algorithm can provide a graded confidence that indicates the reliability of the classification. …”
Get full text
Get full text
Get full text
Thesis -
20
