Search Results - (( basic optimization method algorithm ) OR ( rate detection method algorithm ))

Refine Results
  1. 1

    Optimal resource allocation for NOMA wireless networks by Albogamy, Fahad R., Aiyashi, M. A., Hashim, Fazirul Hisyam, Imran Khan, Choi, Bong Jun

    Published 2022
    “…The major goal is to maximize the users’ maximum weighted sum rate. The suggested algorithm’s most notable feature is that it converges to the global optimal solution. …”
    Get full text
    Get full text
    Article
  2. 2

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…Then, various optimized algorithms for the two core processes in the compression, DCT and motion estimation, were reviewed and analyzed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…We often see many of the method of Genetic Algorithm (GA), Ant Colony Optimization (ACO), Simulated Annealing Algorithm (SAA) and PSO are used for any optimization problems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…A series of experimental results demonstrate that the proposed method can effectively detect anomalies with low false positive rate, high detection rate and achieve higher detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  10. 10

    On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection by Jia, Liu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The experimental results demonstrate that the proposed method is better than that of the original ResNet and other existing methods on various metrics, reaching a 98.88% detection rate and 1.11% false alarm rate on the KDDTrain+ dataset…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators by Abed I.A., Sahari K.S.M., Koh S.P., Tiong S.K., Jagadeesh P.

    Published 2023
    “…A method based on Electromagnetism-Like algorithm (EM) and Genetic Algorithm (GA) is proposed to determine the time-optimal task scheduling for dual robot manipulators. …”
    Conference paper
  16. 16

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction by Abasi, Ammar Kamal Mousa

    Published 2021
    “…Second, three multi-verse optimizer algorithm (MVOs), namely, basic MVO, modified MVO, hybrid MVO is proposed to solve the TDC problem; these algorithms are incremental improvements of the preceding versions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…After discussing about the introduction (the basic of CMOS transistor ), we will discuss how to create the Optimal layout of CMOS Functional Array with the minimum separation based on euler path method. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis