Search Results - (( using selection method algorithm ) OR ( basic detection packet algorithm ))

Refine Results
  1. 1

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Performance optimization method in OFDM based on majorization and minimization technique by Al-Saadi, Alaa Abdullah, Latip, Rohaya, Muhammed, Abdullah

    Published 2019
    “…Phase Noise is considered a remarkable problem which causes significant degradation in detecting packet- based Orthogonal Frequency Division Multiplexing (OFDM) signals. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing by Alsaadi, Alaa Abdullah Mohammed

    Published 2020
    “…The second main factor is a multipath fading channel which causes a delay in OFDM signal and results for Inter Symbol Interference Noise (ISI).Basically, phase noise is considered as main problem that causes significant degradation in detecting packet-based OFDM signals. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Comparison for selection technique in genetic algorithm by Muhamad Azree, Mat Said

    Published 2006
    “…The purpose of this project is to make a comparison for three selection techniques in Genetic Algorithm.The Genetic Algorithm has been implemented in the previous module for Chess Tournament Management System.Base on previous system the selection method only using randomize.By this project module,only three selections method were use for the comparison.They are Roulette Wheel, Steady-State and Rank selection.The result for this comparison has determined the appropriate selection for Genetic Algorithm implementation in Chess Tournament Management System.This will help Chess Tournament Management System to provide a better optimize schedule.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    A decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for bachelor in multimedia / Asmaa Musa by Musa, Asmaa

    Published 2007
    “…A key stage in the system process is the selection of features. This paper discuss about a decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for Bachelor in Multimedia. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…Results of the reviewed techniques show that attribute selection methods capable to resolve the limitations in ID3 algorithm and increase the performance of the method. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…The classification of this type of dataset requires Feature Selection (FS) methods for the extraction of useful information. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced selection method for genetic algorithm to solve traveling salesman problem by Jubeir, Mohammed, Almazrooie, Mishal, Abdullah, Rosni

    Published 2017
    “…Stochastic Universal Selection (SUS) is one of the selection methods in GA which is considered fast but it leads to lower quality solution.Although using Rank Method Selection (RMS) may lead to high quality solution, it has long runtime.In this work, an enhanced selection method is presented which maintains both fast runtime and high solution quality.First, we present a framework to solve TSP using GA with the original selection method SUS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…—Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
    Get full text
    Get full text
    Article
  18. 18

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
    Get full text
    Get full text
    Article
  19. 19

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…One of the main steps after the data collection stage of any method is selecting a subset of the features to be used for the feature selection process. …”
    Get full text
    Get full text
    Thesis