Search Results - (( java simulation optimization algorithm ) OR ( security classification rules algorithm ))

Refine Results
  1. 1

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…The accuracy rate attained is based on implementation of decision fusion using AND rule during classification. Experiments attained a total success rate (TSR) of 96% during parking based on plate recognition only and over 99% TSR during exit based on fusion of plate and face recognition at PSR value of 10. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…The framework divides requirements for the design of hash function into three classifications namely design requirements, security requirements for Boolean function and analysis requirements. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction by Zainol, Annuur Zakiah, Saian, Rizauddin, Teoh, Yeong Kin, Mohd Razali, Muhammad Hasbullah, Abu Bakar, Sumarni

    Published 2024
    “…Although the number of rules and conditions is not statistically significant, HD-AntMiner emerges as a robust algorithm for enhancing classification accuracy in imbalanced datasets, particularly in the context of Shariah-compliant securities prediction.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  12. 12
  13. 13
  14. 14

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  17. 17

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new integrated approach for evaluating sustainable development in the electric vehicle sector by Lu, Wen Min, Chou, Chienheng, Ting, Irene Wei Kiong, Liu, Shangming

    Published 2025
    “…Third, this study uses the classification & regression tree (CART), random forest, and eXtreme gradient boosting (XGBoost) algorithms to assist managers in identifying the key predictive variables for further classification and prediction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis