Search Results - (( rate detection based algorithm ) OR ( shape classification swarm algorithm ))

Refine Results
  1. 1
  2. 2

    Swarm intelligence-based feature selection for amphetamine-type stimulants (ATS) drug 3D molecular structure classification by Draman @ Muda, Azah Kamilah, Mohd Yusof, Norfadzlia, Pratama, Satrya Fajri

    Published 2021
    “…For this purpose, the binary version of swarm algorithms facilitated with the S-shaped or sigmoid transfer function known as binary whale optimization algorithm (BWOA), binary particle swarm optimiza-tion algorithm (BPSO), and new binary manta-ray foraging opti-mization algorithm (BMRFO) are developed for feature selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A New Quadratic Binary Harris Hawk Optimization For Feature Selection by Abdullah, Abdul Rahim, Too, Jing Wei, Mohd Saad, Norhashimah

    Published 2019
    “…This paper proposes the binary version of HHO (BHHO) to solve the feature selection problem in classification tasks. The proposed BHHO is equipped with an S-shaped or V-shaped transfer function to convert the continuous variable into a binary one. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering by Rashed, Alwatben Batoul

    Published 2022
    “…Among multi-objective evolutionary algorithms proposed in the literature, particle swarm optimization (PSO)-based multi-objective (MOPSO) algorithm has been cited to be the most representative. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Although, signature based has high detection rate but it cannot detect novel attacks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…Experimental results demonstrate the effectiveness of our proposed shape classification and retrieval approach in comparison with state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  7. 7

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…Experimental results demonstrate the effectiveness of our proposed shape classification and retrieval approach in comparison with state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  8. 8

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Experimental results show the proposed technique increases accuracy classification percentage up to 99.95%; and the minimum number of bins determine good discretization algorithm. Consequently, attack detection rate increases and false positive alarm rate minimizes. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
    Get full text
    Get full text
    Book Chapter
  13. 13

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
    Get full text
    Get full text
    Book Chapter
  14. 14

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…To achieve that, an anthrax disease outbreak is chosen as a case study.Two artificial anthrax datasets known as WSARE7 and WSARE58 are taken as experiment data.The experiment is measured based on five metrics; detection rate, specificity, false alarm rate, accuracy, and time taken to produce result. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Analysis of artificial neural network and viola-jones algorithm based moving object detection by Rashidan, M. Ariff, Mohd Mustafah, Yasir, Zainal Abidin, Zulkifli, Zainuddin, N. Afiqah, A. Aziz, Nor Nadirah

    Published 2014
    “…The utilization of cascade architecture to the extracted features, benefits the algorithm. The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper