Search Results - (( based optimization method algorithm ) OR ( feature selection packet algorithm ))
Search alternatives:
- method algorithm »
- selection packet »
- packet algorithm »
-
1
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
2
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
3
-
4
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals
Published 2018“…In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
Get full text
Get full text
Article -
5
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals
Published 2017“…In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
Get full text
Get full text
Get full text
Article -
6
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…In the case of detection of specific disorders, wavelet packet and entropy features perform well compared to time-domain energy variations based features and MFCCs and SVD based features. …”
Get full text
Thesis -
7
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Performance of various forecasting algorithms to reduce the number of transmitted packets by sensor node in wireless sensor networks
Published 2018“…The simulation experiments are done using MATLAB software for a variety of algorithms. The selected algorithms for the reduction algorithm in the transmissions include Move Average algorithm (MA), Autoregressive all-pole model parameters — Burg’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation
Published 2017“…It was shown via simulation that the proposed algorithm can significantly improve the downlink LTE-Advanced performance as compared to the conventional CC selection algorithms.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis
Published 2016“…Then, the practically identical mother wavelet, db44, was selected based on standard deviation of wavelet packet coefficients. …”
Get full text
Get full text
Thesis -
12
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Maximum-largest weighted delay first algorithm for heterogeneous traffic in 4G networks
Published 2018“…With this ever evolving technology the need for improvements is required. Packet scheduling is one of the important key features of LTE-A, where it dictates user selection and transmission of those user’s packets based on the priority of the users to reach the receiver correctly. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A packet scheduling scheme for improving real-time applications performance in downlink LTE–advanced
Published 2018“…Quality of Service based packet scheduling is a key-feature of LTE-A mandating selection and transmission of individual user packets based on their priority. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
Published 2016“…The PCA algorithm transforms high-dimensional feature vectors into a low-dimensional feature space, which is used to determine the optimum volume of factors. …”
Get full text
Get full text
Get full text
Article -
16
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. …”
Get full text
Get full text
Get full text
Article -
17
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
18
Optimization of least squares support vector machine technique using genetic algorithm for electroencephalogram multi-dimensional signals
Published 2016“…Discrete wavelet packet transform (DWPT) has been used to extract EEG signals feature and ultimately 204,800 features from 32 subject-independent have been obtained. …”
Get full text
Get full text
Get full text
Article -
19
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
Get full text
Get full text
Thesis -
20
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis
