Search Results - (( using solution using algorithm ) OR ( using (vectorisation OR victimization) based algorithm ))
Search alternatives:
- using algorithm »
- using solution »
- solution using »
-
1
-
2
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
3
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
4
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Additionally, the results of the study indicated that the prediction model for workload performance evaluation using CBR that is optimized with Hash Search technique for determining workload data on Shortest Path analysis via the employment of Dijkstra algorithm can be useful for the prediction of incoming workload based on the status of the DBMS parameters. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…Usually, phishing websites are created resembling legitimate sources to deceive victims. To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
An Automated System For Classifying Conference Papers
Published 2021“…The best classification model was then deployed to a web-based research conference system. The web-based system was developed using the Django web framework, based on a system architecture defined in this project called the Enhanced 3-Tier Web-based System with a Data Mining Layer. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm
Published 2016“…The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre. …”
Get full text
Get full text
Get full text
Article -
8
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…It can also be used to profile victim demographics based on victim characteristics. …”
Get full text
Get full text
Article -
9
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
The swarm-based exploration algorithm with expanded circle pattern for searching activities
Published 2015“…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
Get full text
Get full text
Get full text
Article -
11
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…Genetic Algorithm is used to find the roots or set of optimal solution that satisfy the equation. …”
Get full text
Get full text
Thesis -
13
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
14
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
15
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
16
Optimal power flow using the Jaya algorithm
Published 2016“…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. The optimal solution obtained by the Jaya algorithm is compared with different stochastic algorithms, and demonstrably outperforms them in terms of solution optimality and solution feasibility, proving its effectiveness and potential. …”
Get full text
Get full text
Get full text
Article -
17
Development of a fall detection system based on neural network featuring IoT-Technology
Published 2021“…A body temperature and heartpulse monitoring device were developed for this system to provide the medical personnel additional information on the body condition of the fall victim. Using the latest IoT-technology, the system can be connected to the internet and provides a continuous and real-time monitoring capability. …”
Get full text
Get full text
Get full text
Article -
18
Improving Vector Evaluated Particle Swarm Optimisation by Incorporating Nondominated Solutions
Published 2013“…This algorithm optimises one objective using a swarm of particles where their movements are guided by the best solution found by another swarm. …”
Get full text
Get full text
Get full text
Article -
19
-
20
An algorithm for positive solution of boundary value problems of nonlinear fractional differential equations by Adomian decomposition method
Published 2016“…In the proposed algorithm the boundary conditions are used to convert the nonlinear fractional differential equations to an equivalent integral equation and then a recursion scheme is used to obtain the analytical solution components without the use of undetermined coefficients. …”
Get full text
Get full text
Get full text
Article
