Search Results - (( website optimization model algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- website optimization »
- optimization model »
- model algorithm »
- java adaptation »
-
1
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…HBA as metahueristic algorithm is used to optimize the network training process of ANN to improve their performances. …”
Get full text
Get full text
Get full text
Article -
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
3
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…In this paper, BOA was improvised by combining this algorithm with Harmony Search (HS) in order to achieve optimal results in fuzzy modelling. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The optimization method derives from the metaheuristic algorithm. …”
Get full text
Get full text
Article -
6
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
7
GA optimization-based BRB AI reasoning algorithm for determining the factors affecting customer churn for operators
Published 2024“…Finally, the BRB model is optimized by GA optimization, the input characteristics with high feature weights are obtained, and the accuracy of the churn analysis is verified according to the obtained features. …”
Get full text
Get full text
Get full text
Article -
8
Optimized Decision Forest for Website Phishing Detection
Published 2021“…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
9
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…Keywords: Building Information Model…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
Get full text
Get full text
Book Section -
12
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Published 2024“…Moreover, the knowledge discovery techniques (KDD) and the data mining algorithm were used to optimize the accuracy result. …”
Article -
15
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…The second outcome of this research is BIMB‟s optimal portfolio as a benchmark model for the academic industry for future contributions to the body of knowledge in this field. …”
Get full text
Get full text
Get full text
Thesis -
16
Rapid and accurate Type 2 charging ports detection for electric vehicles using YOLOv8
Published 2024“…We annotated the data on the Roboflow website and trained a model with the YOLOv8 algorithm on Google Colab using a dataset of 223 images. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
