Search Results - (( parallel optimization based algorithm ) OR ( features detection packet algorithm ))
Search alternatives:
- parallel optimization »
- features detection »
- detection packet »
- packet algorithm »
-
1
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…In the case of detection of specific disorders, wavelet packet and entropy features perform well compared to time-domain energy variations based features and MFCCs and SVD based features. …”
Get full text
Thesis -
2
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…In addition, it is also aimed to improve the resource consumption of the packet-based detection approach. CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
3
Feature extraction based on mel-scaled wavelet packet transform for the diagnosis of voice disorders
Published 2011Get full text
Working Paper -
4
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…Feature selection for IDS is a fundamental step in detection procedure and aims to eliminate some irrelevant and unneeded features from the dataset. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
6
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. …”
Get full text
Get full text
Thesis -
8
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
Get full text
Get full text
Thesis -
10
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals
Published 2018“…In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
Get full text
Get full text
Article -
11
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
Published 2012“…This thesis presents the parallel Bees Algorithm as a new approach for optimizing the last results for the Bees Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Parallel distributed computational microcontroller system for adaptive antenna downlink transmitter power optimization
Published 2023Subjects:Article -
13
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
Published 2016“…The PCA algorithm transforms high-dimensional feature vectors into a low-dimensional feature space, which is used to determine the optimum volume of factors. …”
Get full text
Get full text
Get full text
Article -
14
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals
Published 2017“…Properly determining the discriminative fea-tures which characterize the inherent behaviors of electro-encephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
Get full text
Get full text
Get full text
Article -
15
Design and implemtation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayyawi
Published 2016“…Performance indices such as workspace, dexterity and stiffness, of the parallel manipulator are studied. The parallel manipulator is optimized based on the performance indices to obtain on the optimal design parameters for achieved maximum performance of the parallel manipulator. …”
Get full text
Get full text
Student Project -
16
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The results of the study concluded that the best algorithm for detecting malware packages is the Neural Network for the Feature Combination category with an accuracy rate of 96.91%, Recall of 97.35% and Precision of 96.78%. …”
Get full text
Get full text
Get full text
Article -
17
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Real‑time chatter detection during turning operation using wavelet scattering network
Published 2024“…Several attempts have been made to detect chatter. Some manual feature extraction methods used to detect the chatter involve wavelet packet transform (WPT), ensemble empirical mode decomposition (EEMD), local mean decomposition (LMD), and variational mode decomposition (VMD). …”
Get full text
Get full text
Get full text
Article -
19
A review of genetic algorithms and parallel genetic algorithms on Graphics Processing Unit (GPU)
Published 2013“…Genetic Algorithms (GAs) is proven to be effective in solving many optimization tasks. …”
Get full text
Conference or Workshop Item -
20
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…The algorithm is implemented in a simulated network environment and results obtained is analyze based on packet delivery ratio.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
