Search Results - (( based optimization method algorithm ) OR ( terms detection method algorithm ))*
Search alternatives:
- method algorithm »
- terms detection »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
3
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
4
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
6
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The optimization method derives from the metaheuristic algorithm. …”
Get full text
Get full text
Article -
7
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Recent Efficient Iterative Algorithms on Cognitive Radio Cooperative Spectrum Sensing to Improve Reliability and Performance
Published 2016“…In fact, all steps of genetic algorithm (GA), particle swarm optimization (PSO), and imperialistic competitive algorithm (ICA) will be well mentioned in detail and investigated on cognitive radio cooperative spectrum sensing (CRCSS) method. …”
Get full text
Get full text
Article -
9
Neural network algorithm-based fall detection modelling
Published 2020“…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
Get full text
Get full text
Get full text
Article -
10
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…This paper focuses on optimality of analytical study on the common soft fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in details. …”
Get full text
Get full text
Conference or Workshop Item -
11
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. …”
Get full text
Thesis -
12
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
13
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
Get full text
Get full text
Article -
14
-
15
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
16
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
Get full text
Get full text
Thesis -
17
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
19
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Article -
20
Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation
Published 2019“…This is called hybrid artificial bee colony (HABC) strategy, which is based on hybridize of an artificial bee colony (ABC) algorithm with a particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article
