Search Results - (( using optimization _ algorithm ) OR ( security classification using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network by Mohamad, M., Abdullah, E.F.H.S., Ghaleb, S.A.A., Ghanem, W.A.H.M.

    Published 2021
    “…This study introduces an email detection model that is designed based on use of an improved version of the grasshopper optimization algorithm to train a Multilayer Perceptron in classifying emails as ham and spam. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network by Mumtazimah, Mohamad, Engku Fadzli Hasan, Syed Abdullah, Ghaleb, S.A.A., Ghanem, W.A.H.M.

    Published 2021
    “…The main idea of this research is to train a neural network by leveraging a new nature-inspired metaheuristic algorithm referred to as a Grasshopper Optimization Algorithm (GOA) to categorize emails as ham and spam. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean by Lorpunmanee, Siriluck, Abdullah, Abdul Razak

    Published 2007
    “…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
    Get full text
    Article
  8. 8

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
    Get full text
    Get full text
    Thesis
  9. 9

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction by Zainol, Annuur Zakiah, Saian, Rizauddin, Teoh, Yeong Kin, Mohd Razali, Muhammad Hasbullah, Abu Bakar, Sumarni

    Published 2024
    “…Although the number of rules and conditions is not statistically significant, HD-AntMiner emerges as a robust algorithm for enhancing classification accuracy in imbalanced datasets, particularly in the context of Shariah-compliant securities prediction.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…This system has many usages in security system and also can be used for authentication, person verification, video surveillance, preventing crime, and security activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Neural Networks (NNs) are one of the most popular techniques to perform non-linear classification, and have been extensively used in the literature to perform intrusion detection. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Optimized intrusion detection mechanism using soft computing techniques by Ahmad, iftikhar, Azween, Abdullah, Alghamdi, Abdullah, Hussain, Muhammad

    Published 2011
    “…The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…At first, data pre-processing is performed to convert the actual data into useful format. In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
    Get full text
    Get full text
    Thesis