Search Results - (( security classification using algorithm ) OR ( simulation optimization system algorithm ))
Search alternatives:
- security classification »
- classification using »
- optimization system »
- system algorithm »
- using algorithm »
-
1
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
3
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis -
4
Malicious URL classification using artificial fish swarm optimization and deep learning
Published 2023“…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
SVM driven approach for detecting DoS attacks in SDN environment
Published 2025“…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Optimization-based simulation algorithm for predictive-reactive job-shop scheduling of reconfigurable manufacturing systems
Published 2022“…In this case, the effectiveness and reliability of RMS is increase by combining the simulation with the optimization algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
9
Predictive-reactive job shop scheduling for flexible production systems with the combination of optimization and simulation based algorithm
Published 2020“…This research will address some aspects of combining simulation and optimization-based algorithms for job-shop scheduling and rescheduling of flexible production systems. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
Get full text
Get full text
Thesis -
12
An application of simulated Kalman filter optimization algorithm for parameter tuning in proportional-integral-derivative controllers for automatic voltage regulator system
Published 2018“…This paper reports the first attempt to tune gain values in proportional-integral-derivative (PID) controllers using an optimizer called simulated Kalman filter (SKF) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
14
Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy
Published 2019“…This stuffy proposed a novel optimization method labeled the "Differential Evolution Optimization Algorithm" (DEOA) to assess the reliability of power generation systems (PGS). …”
Get full text
Get full text
Conference or Workshop Item -
15
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
16
-
17
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…Several research efforts have been developed to generate optimal operation rules for dam and reservoir systems utilizing different optimization algorithms. …”
Get full text
Get full text
Article -
18
Optimized PV-Battery Systems using Backtracking Search Algorithm for Sustainable Energy Solutions
Published 2024“…Employing the Backtracking Search Algorithm (BSA), the research optimizes PI controller parameters to enhance system efficiency and reliability. …”
Conference Paper -
19
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
20
Teletraffic performance of mobile cellular channel assignment using genetic algorithm
Published 2023Subjects:Conference paper
