Search Results - (( subset detection method algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…In summary, this study advances the field by delivering an effective, optimized predictive algorithm for early heart disease detection, thereby offering valuable insights that could enhance healthcare outcomes, support proactive cardiovascular risk management, and pave the way for future innovations in personalized medicine…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction by Hui, Ng Suk

    Published 2024
    “…The images were reconstructed using the OSEM (16 subsets, 3 iterations) and Q.Clear algorithms, both of which include Point Spread Function (PSF) modelling. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model by Afsoon Badiei, Saeed Meshgini, Ali Farzamnia

    Published 2020
    “…Features can be extracted by three fractal descriptors, Lyapunov exponent and cumulatively discrete wavelet transform. A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Automated underwater vision system for detection and classification of marine life using CNN YOLO-based model / Mohamed Syazwan Asyraf Rosli by Rosli, Mohamed Syazwan Asyraf

    Published 2022
    “…Recently, the integration of computer vision and machine learning has given solutions to improve the underwater detection system by using intelligent classifier algorithm in real-time computer vision to detect underwater animals with challenging environments. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The first layer is used to detect up to superfamily and family in SCOP hierarchy, by using optimized binary SVM classification rules directly to ROC-Area. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Robust techniques for linear regression with multicollinearity and outliers by Mohammed, Mohammed Abdulhussein

    Published 2016
    “…The ordinary least squares (OLS) method is the most commonly used method in multiple linear regression model due to its optimal properties and ease of computation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feature Ranking Techniques For 3D ATS Drug Molecular Structure Identification by Saw, Yee Ching

    Published 2018
    “…The results show that the feature subset selected by the FEFR feature selection approach is either superior or at least as adequate as those subsets that selected by the individual feature ranking method and the original dataset.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    A Naïve-Bayes classifier for damage detection in engineering materials by Addin, O., Salit, Mohd Sapuan, Mahdi Ahmad Saad, Elsadig, Othman, Mohamed

    Published 2007
    “…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
    Get full text
    Get full text
    Get full text
    Article