Search Results - (( using optimization based algorithm ) OR ( security classification mining algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Based on the selected features, the classification is performed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prediction of college student academic performance using data mining techniques. by Abd Jalil, Azura, Mustapha, Aida, Santa, Dzulizah, Zain, Nurul Zaiha, Radwan, Rizalina

    Published 2013
    “…The classification algorithms used are the Decision Tree, Naïve Bayesian, and Multilayer Perception with the highest classification accuracy by the Naive Bayes algorithm with accuracy of 95.3%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse by Madihah Mohd Saudi, Areej Mustafa Abuzaid, Masrur Ibrahim

    Published 2024
    “…Moreover, the knowledge discovery techniques (KDD) and the data mining algorithm were used to optimize the accuracy result. …”
    Article
  6. 6
  7. 7

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval by Slamet, Slamet, Izzeldin, Ibrahim Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Sentiment Analysis of Cyberbullying in Social Media Using Decision Trees by Sulaiman, Aliza Sharina

    Published 2020
    “…This has also risen the possibilities and advancement of security threats. This study uses data mining techniques from the views of users written ion Twitter to use in sentiment analysis of decision tree classification. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Activity recognition based on accelerometer sensor using combinational classifiers by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran

    Published 2015
    “…Publicly accelerometer dataset obtained from Wireless Sensor Data Mining (WISDM) lab has been used in this study. The result of classification was validated using 10-fold cross validation algorithm in order to make sure all the experiments perform well.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…In this thesis, an improved hybrid mining approach is proposed through combination of K-Means clustering and classification techniques. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Activity Recognition Based On Accelerometer Sensor Using Combinational Classifiers by Muhammad Noorazlan Shah, Zainuddin, Md Nasir, Sulaiman, Norwati, Mustapha, Thinagaran, Perumal

    Published 2015
    “…Publicly accelerometer dataset obtained from Wireless Sensor Data Mining (WISDM) lab has been used in this study. The result of classification was validated using 10-fold cross validation algorithm in order to make sure all the experiments perform well.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimization of cost-based hybrid flowshop scheduling using teaching-learning-based optimization algorithm by Ullah, Wasif, Muhammad Ammar, Nik Mu’tasim, Mohd Fadzil Faisae, Ab Rashid

    Published 2024
    “…This paper investigates the optimization of a CHFS problem using the Teaching Learning-Based Optimization (TLBO) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP by Bibi Aamirah Shafaa Emambocus, Muhammed Basheer Jasser, Muzaffar Hamzah, Aida Mustapha, Angela Amphawan

    Published 2021
    “…Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article