Search Results - (( _ application swarm algorithm ) OR ( based application security algorithm ))

Refine Results
  1. 1
  2. 2

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    MARKERLESS ARTICULATED HUMAN MOTION TRACKING USING HIERARCHICAL MULTI-SWARM COOPERATIVE PARTICLE SWARM OPTIMIZATION by SAINI, SANJA Y

    Published 2016
    “…Most recently. the swarm-intelligence based PSO algorithm have been gaining momentum in this tield.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A study of stochastic algorithms for 3D articulated human body tracking by Saini, S., Rambli, D.R.B.A., Sulaiman, S.B., Zakaria, M.N.B.

    Published 2013
    “…The 3D vision based research has gained great attention in recent time because of its increasing applications in numerous domains including smart security surveillance, sports, and computer games and so on. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A study of stochastic algorithms for 3D articulated human body tracking by Saini, S., Rambli, D.R.B.A., Sulaiman, S.B., Zakaria, M.N.B.

    Published 2013
    “…The 3D vision based research has gained great attention in recent time because of its increasing applications in numerous domains including smart security surveillance, sports, and computer games and so on. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A study of stochastic algorithms for 3D articulated human body tracking by Saini, S., Rambli, D.R.B.A., Sulaiman, S.B., Zakaria, M.N.B.

    Published 2013
    “…The 3D vision based research has gained great attention in recent time because of its increasing applications in numerous domains including smart security surveillance, sports, and computer games and so on. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Finally, a crowding distance and non-dominated-sorting-based multi-objective hybrid firefly & particle swarm optimization (MOHFPSO) algorithm is designed for MOOPF problems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…Second, to propose a minimum-weight-based multi-objective algorithm (MOS-MWO), which is based on Particle Swarm Optimization (PSO) technique and a novel minimum weight optimization approach, that improves user’s QoS satisfaction. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Normative Fish Swarm Algorithm For Global Optimization With Applications by Tan, Weng Hooi

    Published 2019
    “…Referred to as Normative Fish Swarm Algorithm (NFSA), the proposed Fish Swarm Algorithm, Optimized by Particle Swarm Optimization with Extended Memory (PSOEM-FSA) is expanded by amalgamating the normative knowledge to provide supplementary guidelines for better global optimum achievement and convergence rate. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20