Search Results - (( generation classifications learning algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- generation classifications »
- classifications learning »
- learning algorithm »
- method algorithm »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
4
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
5
Software defect prediction framework based on hybrid metaheuristic optimization methods
Published 2015“…For the purpose of this study, ten classification algorithms have been selected. The selection aims at achieving a balance between established classification algorithms used in software defect prediction. …”
Get full text
Get full text
Get full text
Thesis -
6
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…Therefore, an optimization method is needed to solve this issue, and one of the best methods to be applied is Butterfly Optimization Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The input weights and hidden layer biases are randomly generated. In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. …”
Get full text
Get full text
Conference or Workshop Item -
8
Modified anfis architecture with less computational complexities for classification problems
Published 2018“…Furthermore, researchers have mainly used metaheuristic algorithms to avoid the problem of local minima in standard learning method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Affect classification using genetic-optimized ensembles of fuzzy ARTMAPs
Published 2015“…Speciation was implemented using subset selection of classification data attributes, as well as using an island model genetic algorithms method. …”
Get full text
Get full text
Get full text
Article -
10
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…This strategy includes a number of components that are a novel approach to clustering generation. In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
11
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The machine learning algorithm is used to train and test datasets with the percentage of 70% which is 140 samples from malware and benign applications and 30% of total datasets which is 60 samples from malware and benign applications respectively. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. …”
Get full text
Get full text
Thesis -
13
Fault classification in smart distribution network using support vector machine
Published 2023“…In this paper, a machine-learning algorithm known as Support Vector Machine (SVM) for fault type classification in distribution system has been developed. …”
Article -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
15
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
Get full text
Get full text
Thesis -
16
Blood cell classification using deep learning
Published 2022“…The learning rate was fine-tuned using the Tuner library from Keras to find the optimal value that generates a well-established model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A novel islanding detection technique using modified Slantlet transform in multi-distributed generation
Published 2019“…A Harmony Search Algorithm (HSA) is used to optimally specify suitable scales of Slantlet transform and Slantlet decomposition levels for accurate islanding classification. …”
Get full text
Get full text
Get full text
Article -
18
k-nearest neighbour using ensemble clustering based on feature selection approach to learning relational data
Published 2016“…Due to the growing amount of data generated and stored in relational databases, relational learning has attracted the interest of researchers in recent years.Many approaches have been developed in order to learn relational data.One of the approaches used to learn relational data is Dynamic Aggregation of Relational Attributes (DARA).The DARA algorithm is designed to summarize relational data with one-to-many relations. …”
Get full text
Get full text
Book Section -
19
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
Get full text
Get full text
Article -
20
An evolutionary based features construction methods for data summarization approach
Published 2015“…A data summarization approach is proposed due to its capability to learn data stored in multiple tables. In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
Get full text
Get full text
Research Report
