Search Results - (( evolution optimization sensor algorithm ) OR ( security classification learning algorithm ))

Refine Results
  1. 1

    Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm by Vincent Chung, Hamzarul Alif Hamzah, Norah Tuah, Kit, Guan Lim, Min, Keng Tan, Kenneth Tze Kin Teo

    Published 2020
    “…Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles by Abdulhasan Al-Jarah, Ali Husam

    Published 2017
    “…In a previous research, a relocating algorithm for mobile sensor network had been introduced and the goal was to save energy and prolong the lifetime of the sensor networks using Particle Swarm Optimization (PSO) where both of sensing radius and travelled distance had been optimized in order to save energy in long-term and shortterm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing by Lim, Shun Hoe, Teo, Jason Tze Wi

    Published 2015
    “…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An improved gbln-pso algorithm for indoor localization problem in wireless sensor network by Muhammad Shahkhir, Mozamir

    Published 2022
    “…Then, we compared the result with Particle Swarm Optimization (PSO), Differential Evolution Particle Swarm Optimization (DEPSO), Health Particle Swarm Optimization (HPSO) and Global best Local Neigborhood Particle Swarm Optimization (GbLN-PSO) algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2023
    “…EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. A comparative analysis is conducted with other well-known algorithms such as Particle Swarm Optimization (PSO), Differential Evolution (DE), Ant Colony Optimization (ACO), Biogeography-Based Optimization (BBO), Teaching-Learning Based Optimization (TLBO), and Beluga Whale Optimization (BWO). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning by Chimeleze C., Jamil N., Ismail R., Lam K.-Y., Teh J.S., Samual J., Akachukwu Okeke C.

    Published 2023
    “…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
    Article
  17. 17

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
    Get full text
    Get full text
    Thesis