Search Results - (( probable optimization method algorithm ) OR ( rate detection method algorithm ))

Refine Results
  1. 1

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity by Yau, Jia Xin

    Published 2023
    “…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…Not much research has been done on method of detecting HLPs for panel data. Hence, we have proposed Robust Diagnostic-F (RDF) to remedy the problem of masking and swamping in detecting HLPs. …”
    Get full text
    Get full text
    Thesis
  4. 4

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…These two models are based on topological placement method. DM is optimized using genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Hence, this thesis presents the optimization of parameters values for the tree-based method by genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A proposed genetic algorithm to optimize service restoration in electrical networks with respect to the probability of transformers failure by Aminian, Masoud, Moazami, Ehsan, Mirzaei, Maryam, Ab Kadir, Mohd Zainal Abidin

    Published 2010
    “…In many researches a Genetic Algorithm is employed as a powerful tool to solve this multi-objective, multi-constraint optimization problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Artificial bee colony algorithm with proposed discrete nearest neighborhood algorithm for discrete optimization problems by Rahimi, Amir Masoud, Ramezani-Khansari, Ehsan

    Published 2021
    “…In addition, 2 types of scout bee were used for to intensify the probability property of the algorithm. Also, convergence in the probability function of employee bees’ movement was prevented by increasing the number of route-creating tours. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz by Abdul Aziz, Nur Izzati

    Published 2016
    “…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem by Ismail, Zuhaimy, Nurhadi, Irhamah, Zainuddin, Zaitul Marlizawati

    Published 2008
    “…Genetic Algorithm as population-based methods are better identifying promising areas in the search space, while Tabu Search and Simulated Annealing as trajectory methods are better in exploring promising areas in search space. …”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…A series of experimental results demonstrate that the proposed method can effectively detect anomalies with low false positive rate, high detection rate and achieve higher detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  17. 17

    On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection by Jia, Liu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The experimental results demonstrate that the proposed method is better than that of the original ResNet and other existing methods on various metrics, reaching a 98.88% detection rate and 1.11% false alarm rate on the KDDTrain+ dataset…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Optimizing optimal path trace back system for Smith-Waterman algorithm using structural modelling technique: article by Saliman, Nur Farah Ain

    Published 2012
    “…This will cause disadvantages in the performance and speed level of the Smith-Waterman Algorithm. Thus, based on other researchers there was various kind of method being use in order to overcome this problem. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
    Get full text
    Get full text
    Thesis