Search Results - (( security classification _ algorithm ) OR ( basic optimization system algorithm ))
Search alternatives:
- security classification »
- optimization system »
- basic optimization »
- system algorithm »
-
1
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. As such, Intrusion Detection Systems (IDSs) have received tremendous attention from security researchers and professionals. …”
Get full text
Get full text
Thesis -
2
Voting algorithms for large scale fault-tolerant systems
Published 2011“…In a nut shell, we tried to introduce voting algorithms and structures suitable for large scale fault-tolerant systems which have optimal and proper time complexity (in parallel voting algorithms) and more reliability and availability (in enhanced m-out-of-n voting algorithm) compared to the basic types.…”
Get full text
Get full text
Thesis -
3
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
4
Particle swarm optimization (PSO) for CNC route problem
Published 2002“…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
Algorithm development for optimization of a refrigeration system
Published 2010“…This thesis deals with algorithm development for optimization of a refrigeration system. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Meanwhile, the proposed QOJaya algorithm produces better results than the basic Jaya method in terms of solution optimality and convergence speed. …”
Get full text
Get full text
Thesis -
8
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. …”
Get full text
Get full text
Conference or Workshop Item -
9
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023“…This algorithm synergizes the ABC algorithm and Artificial Rabbits Optimization (ARO) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
13
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
14
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
15
-
16
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
17
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Article -
18
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
19
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…The modeling of power systems, FACTS devices and genetic algorithms are performed through MATLAB/PSAT simulation. …”
Get full text
Get full text
Thesis -
20
