Search Results - (( data optimization based algorithm ) OR ( data detection based algorithm ))
Search alternatives:
- data optimization »
- detection based »
- data detection »
-
1
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…Experimental results are compared with other alternative online/offline hybrid density-based clustering algorithms. The average processing time for data point in the data stream is about 2 milliseconds which is much lower than the aligned clustering algorithms in literature. …”
Get full text
Get full text
Thesis -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. …”
Get full text
Get full text
Get full text
Article -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
7
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…The optimized DBN algorithm, known as the HW-DBN algorithm, integrated through feature learning based on a Gaussian–Bernoulli Restricted Boltzmann Machine as well as classification task through a weight neuron network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A buffer-based online clustering for evolving data stream
Published 2019“…In this study, we present a fully online density-based clustering algorithm called buffer-based online clustering for evolving data stream (BOCEDS). …”
Get full text
Get full text
Get full text
Article -
9
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
Get full text
Get full text
Thesis -
10
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
11
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
12
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
Get full text
Get full text
Article -
13
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
Get full text
Get full text
Thesis -
15
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
16
Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data
Published 2025“…Industrial process time series data could be processed with ease by deep learning algorithms, particularly transformer-based models because of their multi-head attention mechanism. …”
Get full text
Get full text
Get full text
Article -
17
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Article -
19
-
20
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article
