Search Results - (( java application optimization algorithm ) OR ( subset detection a algorithm ))
Search alternatives:
- application optimization »
- java application »
- subset detection »
- detection a »
- a algorithm »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
3
SVM for network anomaly detection using ACO feature subset
Published 2016“…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
5
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Being that feature subset selection is considered a multi-objective optimization problem, this study proposed the Rao-SVM as an FSS mechanism; its algorithm-specific and parameter-less concept was also explored. …”
Get full text
Get full text
Get full text
Article -
6
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The method is based on mean and maximum values of the amplitudes of waves after dividing them into folds then grouping them by a clustering algorithm (e.g. k-means algorithm). …”
Get full text
Get full text
Get full text
Article -
7
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
8
Algorithm of face recognition by principal component analysis
Published 2002“…A 96% rate of successful detection and a 90% rate of successful recognition were obtained. …”
Get full text
Get full text
Article -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
11
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Thus, a swarm-based hybrid approach is proposed for cancer classification with a new variant of the Firefly Algorithm (FA) and Correlation-based Feature Selection (CFS) filter. …”
Get full text
Get full text
Get full text
Article -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
15
GA-based feature subset selection in a spam/non-spam detection system
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
17
-
18
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
19
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
20
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
Published 2019“…In the first phase of HEFS, a novel Cumulative Distribution Function gradient (CDF-g) algorithm is exploited to produce primary feature subsets, which are then fed into a data perturbation ensemble to yield secondary feature subsets. …”
Get full text
Get full text
Get full text
Article
