Search Results - (( detecting internet optimization algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- internet optimization »
- implication based »
- java implication »
- detecting »
-
1
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
2
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
4
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
Get full text
Get full text
Get full text
Article -
5
-
6
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. …”
Get full text
Get full text
Get full text
Article -
7
An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network
Published 2021“…This study introduces an email detection model that is designed based on use of an improved version of the grasshopper optimization algorithm to train a Multilayer Perceptron in classifying emails as ham and spam. …”
Get full text
Get full text
Conference or Workshop Item -
8
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…Employing Otsu's method and Canny edge detection, the algorithm seeks to accurately identify and contour the edges of potholes in urban road imagery. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
Get full text
Get full text
Get full text
Article -
12
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
13
Feature selection based on particle swarm optimization algorithm for sentiment analysis classification
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…In future work, the algorithm can still be optimized to offer better performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
An ensemble feature selection method to detect web spam
Published 2018“…With regard to increasing available information in virtual space and the need of users to search, the role of search engines and used algorithms are important in terms of ranking. Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
16
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
An efficient detection of Sinkhole attacks using machine learning: impact on energy and security
Published 2025“…This paper introduces SFlexCrypt, an innovative approach tailored to address these security challenges while optimizing energy consumption in WSNs. SFlexCrypt stands out by seamlessly integrating advanced machine learning algorithms to achieve high-precision detection and effective mitigation of sinkhole attacks. …”
Get full text
Get full text
Get full text
Article -
18
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…Then, various optimized algorithms for the two core processes in the compression, DCT and motion estimation, were reviewed and analyzed. …”
Get full text
Get full text
Thesis -
19
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…Meanwhile, Spark Streaming effectively provides illustrious abstraction known as DStream, signifying an uninterrupted stream of data whereas Spark MLlib leverages algorithmic optimizations of MLlib and applies them in the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
20
IoT-Enabled Waste Tracking and Recycling Optimization : Enhancing Sustainable Waste Management
Published 2025“…Real-time monitoring is enabled by IoT sensors and machine vision algorithms, facilitating precise detection of waste levels and material types. …”
Get full text
Get full text
Get full text
Proceeding
