Search Results - (( development subset detection algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  11. 11

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
    Get full text
    Get full text
    Article
  14. 14

    Quantitative analysis evaluation of image reconstruction algorithms between digital and analog PET-CT by Chen, Ew-Jun *, Haniff Shazwan, Safwan Selvam, Lee, Hee Siang, Chew, Ming Tsuey *

    Published 2023
    “…Results demonstrate that both OSEM and HYPER DPR reconstruction algorithms in digital PET-CT has greater spatial resolution, increased detection sensitivity and less image noise when compared to analog PET-CT. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals by Ong, Pauline, Zainuddin, Zarita, Kee, Huong Lai

    Published 2017
    “…Properly determining the discriminative fea-tures which characterize the inherent behaviors of electro-encephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals by Ong, Pauline, Zainuddin, Zarita, Kee, Huong Lai

    Published 2018
    “…Properly determining the discriminative features which characterize the inherent behaviors of electroencephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
    Get full text
    Get full text
    Article
  20. 20

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis