Search Results - model ((((replication algorithm) OR (selection algorithm))) OR (detection algorithm))
Search alternatives:
-
1
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
2
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
Get full text
Get full text
Thesis -
3
Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks
Published 2025“…The data underwent preprocessing, including the application of principal component analysis (PCA) for feature selection. The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
Get full text
Get full text
Get full text
Article -
4
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
5
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…Based on the selected features, three predictive modeling techniques (J48, DTNB and Naive Bayes) were applied for dengue outbreak detection. …”
Get full text
Get full text
Get full text
Article -
6
Replica Creation Algorithm for Data Grids
Published 2012“…Current algorithms focus on number of accesses in deciding which file to replicate and where to place them, which ignores resources’ capabilities. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…This research presents a two-phase phishing detection system by employing unsupervised feature selection and supervised classification. …”
Get full text
Get full text
Get full text
Article -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
10
Academic leadership bio-inspired classification model using negative selection algorithm
Published 2015“…Negative selection algorithm has been successfully used in several purposes such as in fault detection, data integrity protection, virus detection and etc.due to the unique ability in self-recognition by classifying self or non-self’s detectors. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
12
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
13
Neural network algorithm-based fall detection modelling
Published 2020“…However, the improvement of model accuracy is still needed. This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Outbreak detection model based on danger theory
Published 2014“…Two outbreak diseases, dengue and SARS, are subjected to a danger theory algorithm; namely the dendritic cell algorithm.To evaluate the model, four measurement metrics are applied: detection rate, specificity, false alarm rate, and accuracy. …”
Get full text
Get full text
Article -
15
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…However, the problem of improving the accuracy and efficiency of classification models remains open and yet to be resolved. This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
16
Human face detection using skin color segmentation and watershed algorithm
Published 2017“…The process involves transforming the face images from RGB to the selected color models; then segmentation is carried out by selecting a threshold value for each of the color models. …”
Get full text
Get full text
Article -
17
Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms
Published 2022“…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
Get full text
Get full text
Article -
18
Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms
Published 2022“…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
Get full text
Get full text
Article -
19
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
Get full text
Get full text
Article -
20
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis
