Search Results - (( parallel optimization method algorithm ) OR ( security classifications mining algorithm ))
Search alternatives:
- security classifications »
- classifications mining »
- parallel optimization »
- method algorithm »
- mining algorithm »
-
1
Prediction of college student academic performance using data mining techniques.
Published 2013“…The classification algorithms used are the Decision Tree, Naïve Bayesian, and Multilayer Perception with the highest classification accuracy by the Naive Bayes algorithm with accuracy of 95.3%. …”
Get full text
Get full text
Conference or Workshop Item -
2
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
Get full text
Get full text
Thesis -
3
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…Any optimization algorithm is suitable for only a specific domain of optimization problems. …”
Get full text
Get full text
Thesis -
4
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024Subjects:Article -
5
Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms
Published 2015“…This was achieved by mitigating convergence in the genetic algorithms by employing a hierarchical parallel architecture. …”
Get full text
Get full text
Get full text
Article -
6
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
Get full text
Get full text
Research Report -
7
Improved black-winged kite algorithm and finite element analysis for robot parallel gripper design
Published 2024“…This paper presents a comprehensive study on the design optimization of a robotic gripper, focusing on both the gripper modeling and the optimization of its parallel mechanism structure. …”
Get full text
Get full text
Get full text
Article -
8
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
9
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
Get full text
Get full text
Thesis -
10
Analysis of evolutionary computing performance via mapreduce parallel processing architecture / Ahmad Firdaus Ahmad Fadzil
Published 2014“…Examples of EC such as Genetic Algorithm (GA) and PSO (Particle Swarm Optimization) are prevalent due to their efficiency and effectiveness. …”
Get full text
Get full text
Thesis -
11
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
12
Distributed parallel deep learning with a hybrid backpropagation-particle swarm optimization for community detection in large complex networks
Published 2022“…Next, the method is integrated with two optimization algorithms: (1) backpropagation (BP), which optimizes deep learning locally within each local chunk of the CN; (2) particle swarm optimization (PSO), which is used to improve the BP optimization involving all CN chunks. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems
Published 2016“…The AGC loop is used to minimize the frequency deviation and control the power exchange in order to maintain them at their scheduled values due to the changes of the step-load disturbance. The optimal parameters of the PID scheme optimized by the proposed MS algorithm are compared with that one’s obtained by GA algorithm, and the proposed method has proven that its performance is more efficient and improved as well. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using asic design flow: article / Nurzaima Mahmod
“…The scope of this paper is to optimize the DNA sequences alignment on the matrix rilling module by implementing a parallel method of the Smith-Waterman algorithm. …”
Get full text
Get full text
Article -
15
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
Get full text
Get full text
Thesis -
16
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
17
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod
Published 2010“…The scope of this paper is to optimize the DNA sequences alignment on the matrix filling module by implementing a parallel method of the SmithWaterman algorithm. …”
Get full text
Get full text
Thesis -
18
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
19
-
20
Application Of Genetic Algorithms For Robust Parameter Optimization
Published 2010“…Genetic algorithms (GA) are fairly recent in this respect but afford a novel method of parameter optimization. …”
Get full text
Get full text
Article
