Search Results - (( websites optimization method algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- method algorithm »
- java application »
- websites »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…Artificial Neural Network (ANN) is one popular method for website phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics connected to phishing websites through a network training phase. …”
Get full text
Get full text
Get full text
Article -
3
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…However, it is hard to determine the fuzzy parameter manually in a complex problem, and the process of generating the parameter is called fuzzy modelling. Therefore, an optimization method is needed to solve this issue, and one of the best methods to be applied is Butterfly Optimization Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The optimization method derives from the metaheuristic algorithm. …”
Get full text
Get full text
Article -
6
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Power generation allocation in smart grid using Dwarf Mongoose Optimization / Mohamad Irfan Shamani
Published 2025“…Dwarf Mongoose Optimization (DMO) is a new metaheuristic algorithm that published in 2022 by Jeffrey O. …”
Get full text
Get full text
Thesis -
8
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
9
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
10
Optimized Decision Forest for Website Phishing Detection
Published 2021“…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
11
-
12
GA optimization-based BRB AI reasoning algorithm for determining the factors affecting customer churn for operators
Published 2024“…Therefore, in this paper, a belief rule base (BRB) artificial intelligence inference algorithm based on GA optimization to determine the factors affecting customer churn for operators proposed. …”
Get full text
Get full text
Get full text
Article -
13
A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation
Published 2023“…In the future it is recommended to include feature selection method to get the optimal features and better classification accuracies.…”
Get full text
Get full text
Get full text
Article -
14
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…DSF algorithm is a hybrid stereo matching algorithm which divided into two phases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Hybridizing harmony search with local search based metaheuristic for solving curriculum based university course timetabling / Juliana Wahid
Published 2017“…Harmony search algorithm (HSA) is a population-based metaheuristic optimization algorithm that imitates the music improvisation process where musicians improvise their instruments’ pitch by searching for a perfect state of harmony. …”
Get full text
Get full text
Thesis -
16
Schedule of tour guide using genetic algorithm / Nur Aishah Rosli
Published 2017“…The data collection was performed by using the method of interviewing experts or any official resource such as a Tourism Malaysia website. …”
Get full text
Get full text
Thesis -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
18
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
19
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
Get full text
Get full text
Book Section -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
