Search Results - (( using optimization based algorithm ) OR ( parameter detection system algorithm ))

Refine Results
  1. 1

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…Fuzzy system is a rule-based system by using human experts which hold the truth values or membership values to make a particular decision while fuzzy modelling is a process of identifying the fuzzy parameter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Analytical redundancy based fault detection system generally requires an accurate model. …”
    Get full text
    Conference or Workshop Item
  9. 9

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Hence, the algorithm must overcome the problem of dynamic updates in the internal parameters or counter the concept drift. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Reactive approach for automating exploration and exploitation in ant colony optimization by Allwawi, Rafid Sagban Abbood

    Published 2016
    “…Ant colony optimization (ACO) algorithms can be used to solve nondeterministic polynomial hard problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…Interaction, or t-way, testing, where t indicates the interaction strength, is an approach to generate test suite for detecting fault due to interaction. In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors by AlRijeb, Mothena Fakhri Shaker, Othman, Mohammad Lutfi, Ishak, Aris, Hassan, Mohd Khair, Albaker, Baraa Munqith

    Published 2025
    “…Irrelevant features in data collected from oil refineries affect system performance due to conflicts between normal data and detected faults. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Evaluating Bees Algorithm for Sequence-based T-way Testing Test Data Generation by M. H., Mohamed Zabil, Kamal Z., Zamli, K. C., Lim

    Published 2018
    “…T-way testing is a testing technique that is used to detect faults due to parameter interactions or software configurations. …”
    Get full text
    Get full text
    Get full text
    Article