Search Results - (( network selection machine algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- selection machine »
- machine algorithm »
- java simulation »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
3
Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition
Published 2007“…In the selection phase, a new variable length genetic algorithm is applied to select the lexical cues. …”
Get full text
Get full text
Thesis -
4
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis -
5
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
6
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
8
Impact of data balancing and feature selection on machine learning based network intrusion detection
Published 2023“…Meanwhile, machine learning algorithms can capture the labeled data's pattern by considering the input features. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim
Published 2023“…The models are based on the four machine learning algorithms: logistic regression, support vector machine, decision tree, and neural network; two ensemble techniques: adaptive boost and bootstrap aggregation; three deep learning algorithms: recurrent neural network, long short-term memory(LSTM), and gated recurrent unit (GRU). …”
Get full text
Get full text
Thesis -
10
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
11
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
12
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
13
Early detection of dengue disease using extreme learning machine
Published 2018“…Therefore, this research proposed an improved algorithm known as ELM which is an extension of Feed Forward Neural Network that utilize the Moore Penrose Pseudoinver matrix that gain the optimal weights of neural network architecture. …”
Get full text
Get full text
Article -
14
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Committee neural networks with fuzzy genetic algorithm.
Published 2011“…Combining numerous appropriate experts can improve the generalization performance of the group when compared to a single network alone. There are different ways of combining the intelligent systems' outputs in the combiner in the committee neural network, such as simple averaging, gating network, stacking, support vector machine, and genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Double-layered hybrid neural network approach for solving mixed integer quadratic bilevel problems
Published 2010Get full text
Book chapter -
18
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…The total work is completed by the selection, assessment, and implementation of the Machine Learning (ML) model, and finally, proposed the crime prediction. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimal variational mode decomposition and integrated extreme learning machine for network traffic prediction
Published 2021“…Given this context, this paper proposes a network traffic prediction mechanism based on optimized Variational Mode Decomposition (VMD) and Integrated Extreme Learning Machine (ELM). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network
Published 2009“…Experimentally observed responses were used to train, map and optimize the network algorithms before the best architecture was selected. …”
Get full text
Get full text
Article
