Search Results - (( security classification using algorithm ) OR ( simulation optimization system algorithm ))

Refine Results
  1. 1

    PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm by Muhamad Zahim, Sujod, Siti Nor Azlina, Mohd Ghazali, Mohd Fadzil, Abdul Kadir, Al-Shetwi, Ali Qasem

    Published 2024
    “…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Malicious URL classification using artificial fish swarm optimization and deep learning by Mustafa Hilal, Anwer, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, K. Nour, Mohamed, M. Asiri, Mashael, M. Al-Sharafi, Ali, Othman, Mahmoud, Motwakel, Abdelwahed

    Published 2023
    “…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    SVM driven approach for detecting DoS attacks in SDN environment by Najmun, Nisa, Adnan Shahid, Khan, Azman, Bujang Masli, Nusrat, Shaheen

    Published 2025
    “…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimization-based simulation algorithm for predictive-reactive job-shop scheduling of reconfigurable manufacturing systems by Tan, Joe Yee

    Published 2022
    “…In this case, the effectiveness and reliability of RMS is increase by combining the simulation with the optimization algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Predictive-reactive job shop scheduling for flexible production systems with the combination of optimization and simulation based algorithm by Abdul Rahman, Azrul Azwan, Joe Yee, Tan, A Rahman, Muhamad Arfauz, Salleh, Mohd Rizal, Bilge, Pinar

    Published 2020
    “…This research will address some aspects of combining simulation and optimization-based algorithms for job-shop scheduling and rescheduling of flexible production systems. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An application of simulated Kalman filter optimization algorithm for parameter tuning in proportional-integral-derivative controllers for automatic voltage regulator system by Badaruddin Muhammad, Dwi Pebrianti, Normaniha Abdul Ghani, Nor Hidayati Abdul Aziz, Nor Azlina Ab Aziz, Mohd Saberi Mohamad, Mohd Ibrahim Shapiai, Zuwairie Ibrahim

    Published 2018
    “…This paper reports the first attempt to tune gain values in proportional-integral-derivative (PID) controllers using an optimizer called simulated Kalman filter (SKF) algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy by Kadhem, Athraa Ali, Abdul Wahab, Noor Izzri, Abdalla, Ahmed N.

    Published 2019
    “…This stuffy proposed a novel optimization method labeled the "Differential Evolution Optimization Algorithm" (DEOA) to assess the reliability of power generation systems (PGS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Koting, Suhana, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2019
    “…Several research efforts have been developed to generate optimal operation rules for dam and reservoir systems utilizing different optimization algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    Optimized PV-Battery Systems using Backtracking Search Algorithm for Sustainable Energy Solutions by Abdolrasol M.G.M., Jern Ker P., Hannan M.A., Tiong S.K., Ayob A., Almadani J.F.S.

    Published 2024
    “…Employing the Backtracking Search Algorithm (BSA), the research optimizes PI controller parameters to enhance system efficiency and reliability. …”
    Conference Paper
  19. 19

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20