Search Results - (( group evaluation method algorithm ) OR ( worm detection method algorithm ))
Search alternatives:
-
1
A traffic signature-based algorithm for detecting scanning internet worms
Published 2009“…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
Get full text
Get full text
Get full text
Article -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
-
4
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
5
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. …”
Get full text
Get full text
Get full text
Article -
6
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…Both algorithm been illustrated in textbook selection. The proposed methods can be utilized as another option to solve a decision making problem.…”
Get full text
Get full text
Thesis -
7
Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood
Published 2004“…First experiment use exact match, which is no method, is applied. Second experiment use stenmiing method. …”
Get full text
Get full text
Thesis -
8
-
9
Review of the research landscape of multi-criteria evaluation and bench- marking processes for many-objective optimisation methods: coherent taxonomy, challenges and recommended so...
Published 2020“…Evaluation and benchmarking of many-objective optimization (MaOO) methods are complicated. …”
Get full text
Get full text
Article -
10
Clustering of Chemical Compounds using Unsupervised Neural Networks Algorithms: a comparison
Published 2006“…The results of the SOM neural networks, Wards and Group-Average methods are evaluated for the clustering of different biologically active chemical molecules that can be used as drug like compounds based on topological descriptors. …”
Get full text
Get full text
Conference or Workshop Item -
11
Clustering of chemical compounds using unsupervised neural networks algorithms : a comparison
Published 2006“…The results of the SOM neural networks, Wards and Group-Average methods are evaluated for the clustering of different biologically active chemical molecules that can be used as drug like compounds based on topological descriptors. …”
Get full text
Get full text
Conference or Workshop Item -
12
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…In order to address the above mentioned challenges, this study is devoted towards the development of a clusterer and a clustering ensemble learning method based on incremental genetic algorithms addressing group unlabeled samples. …”
Get full text
Get full text
Thesis -
13
Group method of data handling with artificial bee colony in combining forecasts
Published 2018“…This study is done by combining individual forecasts of Group Method of Data Handling models using the weighted-based combine approach. …”
Get full text
Get full text
Article -
14
Multi-objective clustering algorithm using particle swarm optimization with crowding distance (MCPSO-CD)
Published 2020“…The results of the evaluation show that the proposed approach exemplified the state-of-the-art method with significant differences in most of the datasets tested.…”
Get full text
Get full text
Get full text
Article -
15
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
16
-
17
Evaluating A New Adaptive Group Lasso Imputation Technique For Handling Missing Values In Compositional Data
Published 2024“…The complexity of compositional data with missing values renders traditional estimation methods inadequate. In this thesis, a compositional data imputation method designed based on LASSO is proposed combining group LASSO and adaptive LASSO analysis methods. …”
Get full text
Get full text
Thesis -
18
Inchworm robot grippers in clothes manipulation - Optimizing the tracing algorithm
Published 2023Conference paper -
19
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. …”
Get full text
Get full text
Article -
20
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…The developed algorithm weighted the n objects contribution in explaining the separation between groups. …”
Get full text
Get full text
Monograph
