Search Results - (( intrusion selection mechanism algorithm ) OR ( based optimization steam algorithm ))
Search alternatives:
- intrusion selection »
- selection mechanism »
- mechanism algorithm »
- optimization steam »
- steam algorithm »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
3
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Being that feature subset selection is considered a multi-objective optimization problem, this study proposed the Rao-SVM as an FSS mechanism; its algorithm-specific and parameter-less concept was also explored. …”
Get full text
Get full text
Get full text
Article -
4
Optimized intrusion detection mechanism using soft computing techniques
Published 2011“…So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. …”
Get full text
Get full text
Get full text
Article -
5
Neuro-Fuzzy and Particle Swarm Optimization based Model for the Steam and Cooling sections of a Cogeneration and Cooling Plant
Published 2009“…Neuro-fuzzy approach trained by a sequence of optimization algorithms-Particle Swarm Optimization (PSO) followed by Back-Propagation (BP)-is used to develop models for the steam drum pressure, steam drum water level, steam flow rate and chilled water supply temperature. …”
Get full text
Conference or Workshop Item -
6
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
7
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
8
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. Traditional intrusion detection techniques have had trouble dealing with dynamic environments. …”
Get full text
Get full text
Get full text
Thesis -
9
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
10
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
Get full text
Get full text
Thesis -
11
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
12
SYSTEMATIC DESIGN ALGORITHM FOR ENERGY EFFICIENT AND COST EFFECTIVE HYDROGEN PRODUCTION FROM PALM WASTE
Published 2012“…In the current study, a systematic autonomous algorithm incorporating reaction kinetics model, flowsheet calculations, heat integration analysis and economic evaluation, has been developed to calculate optimum parameters giving minimum hydrogen production cost using optimization strategies. …”
Get full text
Get full text
Thesis -
13
Optimization of stiffened panel fatigue life by using finite element analysis
Published 2020“…The multi-objective genetic algorithm which selects the design points based on Pareto optimal design combined with the adaptive multi-objective algorithm method which uses an optimal space-filling was shown to be efficient for time limitation and budget. …”
Get full text
Get full text
Thesis -
14
Temperature control of a pilot plant reactor system using a genetic algorithm model‐based control approach
Published 2007“…The work described in this paper aims at exploring the use of an artificial intelligence technique, i.e. genetic algorithm (GA), for designing an optimal model-based controller to regulate the temperature of a reactor. …”
Get full text
Get full text
Article -
15
-
16
BCLH2Pro: a novel computational tools approach for hydrogen production prediction via machine learning in biomass chemical looping processes
Published 2024“…The study proposes an integrated Fe2O3-based ฺBCLpro combining steam gasification for H2 production. …”
Get full text
Get full text
Get full text
Article -
17
Development of optimized maintenance scheduling model for coal-fired power plant boiler
Published 2023“…The optimal schedules obtained were compared with the actual based on parameters and judgement from power plant planning team. …”
text::Thesis -
18
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. We propose a diverse fusion-selection approach that stands on Oracle to be applied to the classifier ensemble design, where the Oracle is a random linear function. …”
Get full text
Get full text
Thesis -
20
Improving the environmental impact of palm kernel shell through maximizing its production of hydrogen and syngas using advanced artificial intelligence
Published 2019“…The main target of this research is to improve the production of hydrogen and syngas from palm kernel shell (PKS) steam gasification through defining the optimal operating parametersâ�� using a modern optimization algorithm. …”
Get full text
Get full text
Article
