Search Results - (( using detection method algorithm ) OR ( software optimization based algorithm ))

Refine Results
  1. 1

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Mohd Sharif, Zakaria, Mohammad Fadhil, Abas, Fatimah, Dg Jamil, Norhafidzah, Mohd Saad, Addie, Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Zakaria, Mohd Sharif, Abas, Mohammad Fadhil, Dg Jamil, Fatimah, Mohd Saad, Norhafidzah, Hashim, Addie Irawan, Pebrianti, Dwi

    Published 2024
    “…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…The study of traditional marble game will be implemented in a game prototype using Ant Colony Optimization (ACO). ACO technique is used for searching method in order to find the nearest marble that can be selected to be shot. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2019
    “…This is called hybrid artificial bee colony (HABC) strategy, which is based on hybridize of an artificial bee colony (ABC) algorithm with a particle swarm optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Automatic Textile Stain Detection Using Yolo Algorithm by Keerthan, N., Ushasree, , Priyanka, Mohan

    Published 2024
    “…This research paper proposes a novel approach for automatic textile stain detection using the YOLO (You Only Look Once) algorithm, a state-of-the-art object detection model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis by Ashraf Osman, Ibrahim, Siti Mariyam, Shamsuddin, Abdulrazak, Yahya Saleh, Ahmed, Ali, Mohd Arfian, Ismail, Shahreen, Kasim

    Published 2019
    “…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…Machine learning approaches have been widely used to increase the effectiveness of intrusion detection platforms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis