Search Results - (( data optimization based algorithm ) OR ( software detection method algorithm ))
Search alternatives:
- software detection »
- data optimization »
- method algorithm »
-
1
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
2
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
3
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The second contribution of this thesis is developing an accurate search-based test data generator for generating automatically optimal test data to satisfy the whole constraints in the path. …”
Get full text
Get full text
Get full text
Thesis -
5
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
Get full text
Get full text
Thesis -
8
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In addition, DL-based malware detection methods often entail single classifiers. …”
Get full text
Get full text
Get full text
Article -
9
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…The focus of this research is on the development of a model that can optimize the initial parameters of FLN based on MRPSO to obtain an optimal set of initial parameters for FLN, thus, creating an optimal FLN classifier named as MRPSO-FLN which can improve the efficacy of network intrusion on data sets that contain instances of multiple classes of attacks. …”
Get full text
Get full text
Thesis -
10
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
11
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
Get full text
Get full text
Get full text
Article -
12
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
13
Human presence detection system
Published 2024“…Overall, the project contributes valuable insights into the development of IoT-based human presence detection systems, paving the way for applications in occupancy monitoring and resource optimization.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Article -
16
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
19
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…The challenge in regression testing is the selection of best test cases from the existing test suite.This paper presents an evolutionary regression test case prioritization for object-oriented software based on extended system dependence graph model of the affected program using genetic algorithm. …”
Get full text
Get full text
Article -
20
An efficient unknown detection approach for RFID data stream management system
Published 2025“…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article
