Search Results - (( using function search algorithm ) OR ( security classifications using algorithm ))
Search alternatives:
- security classifications »
- classifications using »
- function search »
- using algorithm »
- using function »
-
1
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
2
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
3
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Passwords are frequently used to control access to restricted functions. …”
Get full text
Get full text
Thesis -
4
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
5
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
6
-
7
Protein Conformantional Search Using Bees Algorithm
Published 2008“…To this end, an energy function is used to calculate its energy and a conformational search algorithm is used to search the conformational search space to find the lowest free energy corformation.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
9
Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm
Published 2021“…The newly proposed algorithm was tested using a set of standard benchmark functions with different searching space and global optima placement. …”
Get full text
Get full text
Get full text
Article -
10
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
11
Enhancing the cuckoo search with levy flight through population estimation
Published 2016“…The algorithm is tested on five benchmark functions such as Ackley function, Griewank function, Rastrigin function, Rosenbrock function and Schwefel function. …”
Get full text
Get full text
Article -
12
Enhancing harmony search parameters based on step and linear function for bus driver scheduling and rostering problems
Published 2018“…Therefore,it is of great interest that we find adjustments for these parameters in this research.There are two contributions to this research.The first one is having HMCR parameter using step function and the linear increase function while the second is applying the fret spacing concept on guitars that is associated with mathematical formulae is also applied in the BW parameter.There are three proposed models on the alteration of HMCR parameters based on the use of the fundamental step function;namely,the constant interval of step function, and its dynamic increase and decrease interval functions.The experimental results revealed that our proposed approach is superior to other state of the art harmony searches either in specific or generic cases. …”
Get full text
Get full text
Get full text
Thesis -
13
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Article -
14
Assessing the symbiotic organism search variants using standard benchmark functions
Published 2019“…Symbiotic Organism Search (SOS) is one of the latest meta-heuristic algorithms created to solve optimization problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
16
Ringed seal search for global optimization via a sensitive search model / Younes Saadi
Published 2018“…The quality of the algorithm is comprehensively evaluated on various standard benchmark test functions using variety of quality metrics and using three baseline algorithms for comparison. …”
Get full text
Get full text
Get full text
Thesis -
17
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…This paper presented an application of Artificial Neural Network (ANN) in steady state stability classifications. A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
Get full text
Get full text
Article -
18
Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems
Published 2012“…The proposed algorithm, which is called Vector Evaluated Gravitational Search Algorithm (VEGSA), uses a number of populations of particles. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
K-NN classifier for data confidentiality in cloud computing
Published 2014“…The RSA algorithm is used to encrypt the sensitive data to keep it secure. …”
Get full text
Get full text
Conference or Workshop Item -
20
