Search Results - (( evolution optimization sensor algorithm ) OR ( subset detection method algorithm ))
Search alternatives:
- evolution optimization »
- optimization sensor »
- sensor algorithm »
- subset detection »
- method algorithm »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
2
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
3
Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm
Published 2020“…Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Experiments demonstrate that ensemble classifier learning method produces better accuracy mining data streams and selecting subset of relevant features comparing other single classifiers. …”
Get full text
Get full text
Thesis -
5
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
6
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…In a previous research, a relocating algorithm for mobile sensor network had been introduced and the goal was to save energy and prolong the lifetime of the sensor networks using Particle Swarm Optimization (PSO) where both of sensing radius and travelled distance had been optimized in order to save energy in long-term and shortterm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
Get full text
Get full text
Get full text
Article -
8
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
9
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Algorithm of face recognition by principal component analysis
Published 2002“…The database is divided into subsets, where each subset represents one of 10 different individuals. …”
Get full text
Get full text
Article -
11
Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing
Published 2015“…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
An improved gbln-pso algorithm for indoor localization problem in wireless sensor network
Published 2022“…Then, we compared the result with Particle Swarm Optimization (PSO), Differential Evolution Particle Swarm Optimization (DEPSO), Health Particle Swarm Optimization (HPSO) and Global best Local Neigborhood Particle Swarm Optimization (GbLN-PSO) algorithm. …”
Get full text
Get full text
Thesis -
13
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
14
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
15
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
16
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
17
Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building
Published 2023“…EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. A comparative analysis is conducted with other well-known algorithms such as Particle Swarm Optimization (PSO), Differential Evolution (DE), Ant Colony Optimization (ACO), Biogeography-Based Optimization (BBO), Teaching-Learning Based Optimization (TLBO), and Beluga Whale Optimization (BWO). …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
19
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
20
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
