Search Results - (( rate optimization method algorithm ) OR ( based optimization mining algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Ideal combination feature selection model for classification problem based on bio-inspired approach by Basir, Mohammad Aizat, Hussin, Mohamed Saifullah, Yusof, Yuhanis

    Published 2020
    “…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
    Get full text
    Get full text
    Book Section
  3. 3

    Optimization of attribute selection model using bio-inspired algorithms by Basir, Mohammad Aizat, Yusof, Yuhanis, Hussin, Mohamed Saifullah

    Published 2019
    “…Hence, reducing the consistency of the accuracy rate. The aim of this paper is to investigate the use of bio-inspired search algorithms in producing optimal attribute set. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems by Haneen, Abd Wahab, Noraziah, Ahmad, Alsewari, Abdulrahman A., Sinan, Q. Salih

    Published 2019
    “…Black Hole (BH) optimization algorithm has been underlined as a solution for data clustering problems, in which it is a population-based metaheuristic that emulates the phenomenon of the black holes in the universe. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems by Abdulwahab, Haneen A., Noraziah, Ahmad, Al-Sewari, Abdul Rahman Ahmed Mohammed, Salih, Sinan Q.

    Published 2019
    “…Black Hole (BH) optimization algorithm has been underlined as a solution for data clustering problems, in which it is a population-based metaheuristic that emulates the phenomenon of the black holes in the universe. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO by Sharifah Sakinah, Syed Ahmad

    Published 2014
    “…Therefore, it can be solved by using population-based techniques such as Genetic Algorithm and Particle Swarm Optimization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set by Yap, Chau Tean

    Published 2022
    “…Six machine learning algorithms were applied and compared based on the classification evaluation methods. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…The novel optimization-based artificial intelligence algorithm proposed in this paper implies an improved way to overcome a real engineering challenge i.e. handling missing values for better RUL prediction, hence bringing great opportunities for the domain area. …”
    Get full text
    Get full text
    Article
  10. 10

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  13. 13

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…At the end of the process, the system will utilise this model to detect cryptojacking and users will be able to detect new cryptojacking malware based on the model. This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Hence, this thesis presents the optimization of parameters values for the tree-based method by genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review by Ahmad, Rabiah, Abd Hamid, Nazirah, Selamat, Siti Rahayu

    Published 2018
    “…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  17. 17

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability by Romli, Nurul Atiqah

    Published 2024
    “…The proposed algorithm in the retrieval phase showed optimal performance as compared to the baseline algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimizing Tree-Based Contrast Subspace Mining Using Genetic Algorithm by Sia, Florence Fui Sze, Rayner Alfred

    Published 2022
    “…This paper proposes a tree-based method which incorporates genetic algorithm to optimize the contrast subspace search by identifying global optima contrast subspace. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An application of IPA approach on the optimization of a mining port stockyard system by Ayu, Media Anugerah, Cardew-Hall, Michael

    Published 2002
    “…Perturbation Analysis Robbins Monro Single Run (PARMSR) algorithm were applied in the optimization of sub-system 1 and rules devised to determining optimal operating condition in sub-system 2. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper