Search Results - (( using optimization method algorithm ) OR ( subset detection based algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…In summary, this study advances the field by delivering an effective, optimized predictive algorithm for early heart disease detection, thereby offering valuable insights that could enhance healthcare outcomes, support proactive cardiovascular risk management, and pave the way for future innovations in personalized medicine…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model by Afsoon Badiei, Saeed Meshgini, Ali Farzamnia

    Published 2020
    “…A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction by Hui, Ng Suk

    Published 2024
    “…The images were reconstructed using the OSEM (16 subsets, 3 iterations) and Q.Clear algorithms, both of which include Point Spread Function (PSF) modelling. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Automated underwater vision system for detection and classification of marine life using CNN YOLO-based model / Mohamed Syazwan Asyraf Rosli by Rosli, Mohamed Syazwan Asyraf

    Published 2022
    “…Hence, the proposed YOLO model is further improved based on the model optimization using a challenging The Brackish Dataset. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Feature Ranking Techniques For 3D ATS Drug Molecular Structure Identification by Saw, Yee Ching

    Published 2018
    “…The results show that the feature subset selected by the FEFR feature selection approach is either superior or at least as adequate as those subsets that selected by the individual feature ranking method and the original dataset.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Robust techniques for linear regression with multicollinearity and outliers by Mohammed, Mohammed Abdulhussein

    Published 2016
    “…The ordinary least squares (OLS) method is the most commonly used method in multiple linear regression model due to its optimal properties and ease of computation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    MRFGRO: a hybrid meta-heuristic feature selection method for screening COVID-19 using deep features by Dey, Arijit, Chattopadhyay, Soham, Pawan Kumar Singh, Ahmadian, Ali, Ferrara, Massimiliano, Senu, Norazak, Sarkar, Ram

    Published 2021
    “…Then, we have proposed a hybrid meta-heuristic feature selection (FS) algorithm, named as Manta Ray Foraging based Golden Ratio Optimizer (MRFGRO) to select the most significant feature subset. …”
    Get full text
    Get full text
    Article
  19. 19

    A Naïve-Bayes classifier for damage detection in engineering materials by Addin, O., Salit, Mohd Sapuan, Mahdi Ahmad Saad, Elsadig, Othman, Mohamed

    Published 2007
    “…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
    Get full text
    Get full text
    Article