Search Results - (( software detection method algorithm ) OR ( using optimization learning algorithm ))

Refine Results
  1. 1

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…This situation makes the detection of cyber-based attacks on computer networks a relevant and challenging area of research. The Fast Learning Network (FLN) is one of the new machine learning algorithms that are easy to implement, computationally efficient, and with excellent learning performance characteristics. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The proposed project achieves overall accuracy level of 96.67% using Sequential Minimal Optimization classifier.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Comparative Analysis of Pneumonia Detection from Chest X-Ray Images Using CNN And Transfer Learning by Naveen Kumar, M., Ushasree, ., Che Fuzlina, Fuad

    Published 2024
    “…This research shows which neural network algorithm is optimal for detecting pneumonia, and how medical practitioners might use it in the actual world. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A new model for iris data set classification based on linear support vector machine parameter's optimization by Faiz Hussain, Zahraa, Ibraheem, Hind Raad, Alsajri, Mohammad, Ali, Ahmed Hussein, Mohd Arfian, Ismail, Shahreen, Kasim, Sutikno, Tole

    Published 2020
    “…In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance by Rafrastara, Fauzi Adi, Ghozi, Wildanil, Sani, Ramadhan Rakhmat, Handoko, Lekso Budi, Abdussalam, Abdussalam, Pramudya, Elkaf Rahmawan, M. Abdollah, Faizal

    Published 2025
    “…Recent studies have shown that this challenge can be addressed by employing machine learning algorithms for detection. Some studies have also implemented various feature selection methods to optimize detection efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning by Abuzaraida, Mustafa Ali, A. L. gaud, Sarah, Abrahim Hneish, Hamza, Attarbashi, Zainab

    Published 2026
    “…Using the YOLOv8 algorithm, a model was trained to detect and track the state of coffee in real time. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI by Ramli, Zarina

    Published 2024
    “…Additionally, the SVM algorithm was evaluated based on its performance across different DWI bvalues, aiming to optimize scanning time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Video colorization using canny optimization technique / Irwin Kevin Mueson by Irwin Kevin Mueson

    Published 2016
    “…Colorization process will be using the technique of Canny Optimization method. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimized Decision Forest for Website Phishing Detection by Balogun, A.O., Mojeed, H.A., Adewole, K.S., Akintola, A.G., Salihu, S.A., Bajeh, A.O., Jimoh, R.G.

    Published 2021
    “…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
    Get full text
    Get full text
    Article
  19. 19

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    ReSTiNet : An efficient deep learning approach to improve human detection accuracy by Sumit, Shahriar Shakir, Dayang Rohaya, Awang Rambli, Seyedali, Mirjalili, Miah, Md Saef Ullah, Muhammad Mudassir, Ejaz

    Published 2023
    “…In recent days, Deep Learning has improved human detection technology. Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
    Get full text
    Get full text
    Get full text
    Article