Search Results - ((detection algorithm) OR (optimization algorithm))
-
1
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
3
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
4
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
5
Solving time gap problems through the optimization of detecting stepping stone algorithm
Published 2004“…It is found that current algorithm of detecting stepping stone is not optimized. …”
Get full text
Get full text
Book Section -
6
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2023“…The DLF algorithm is optimized by means of repulsive artificial potential force to disperse the agents in order to optimize the search space coverage and detection time. …”
Get full text
Get full text
Get full text
Article -
7
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
8
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
9
Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan
Published 2005“…The results from both the optimized approach and existing algorithm are compared. …”
Get full text
Get full text
Thesis -
10
A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method
Published 2018“…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
Get full text
Get full text
Get full text
Article -
11
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Subjects: “…Sequential minimal optimization algorithms…”
Conference Paper -
12
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
13
Advanced chirped spectral modulation technique and particle swarm optimization algorithms for effective indoor air pollution detection and monitoring
Published 2025“…To address this challenge, optimization algorithms such as the Particle Swarm Optimization (PSO) algorithm have shown promise. …”
Article -
14
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
Published 2017“…Ant colony optimization (ACO) is a metaheuristic algorithm that has been successfully applied to several types of optimization problems such as scheduling, routing, and more recently for solving protein functional module detection (PFMD) problem in protein-protein interaction (PPI) networks. …”
Get full text
Get full text
Thesis -
15
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
Published 2017“…Ant colony optimization (ACO) is a metaheuristic algorithm that has been successfully applied to several types of optimization problems such as scheduling, routing, and more recently for solving protein functional module detection (PFMD) problem in protein-protein interaction (PPI) networks. …”
Get full text
Get full text
Thesis -
16
Particle Swarm Optimization algorithm for facial emotion detection
Published 2010Get full text
Working Paper -
17
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
18
Cooperative Source Detection Using An Optimized Distributed Levy Flight Algorithm
Published 2023“…Cooperative Source Detection Using An Optimized Distributed Levy Flight Algorithm by Mad Helmi Ab. …”
Get full text
article -
19
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2024“…Cooperative source detection using an optimized distributed levy flight algorithm by Mad Helmi Ab. …”
Get full text
article -
20
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…The Ant Colony Optimization (ACO) Algorithm has been adapted for the protein functional module detection by modeling the problem as an optimization problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
