Search Results - (( rate optimization method algorithm ) OR ( features detection method algorithm ))
Search alternatives:
- features detection »
- rate optimization »
- method algorithm »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
3
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…The aim of this work is to develop an improved optimization method for IDS that can be efficient and effective in subset feature selection and parameters optimization. …”
Get full text
Get full text
Thesis -
4
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…In this paper, we use two-step features selection and Quality Threshold with Optimization methods to design anomaly-based HIDS and NIDS separately. …”
Get full text
Get full text
Get full text
Article -
5
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Article -
7
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
Get full text
Get full text
Get full text
Thesis -
9
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Optimized intrusion detection mechanism using soft computing techniques
Published 2011“…Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates. …”
Get full text
Get full text
Get full text
Article -
11
Particle swarm optimization with deep learning for human action recognition
Published 2021“…Also, the current motion target detection algorithms extract features from the relevant object only if the moving object has complex texture features. …”
Get full text
Get full text
Article -
12
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
14
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
15
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
16
Optimization of feature selection in Support Vector Machines (SVM) using recursive feature elimination (RFE) and particle swarm optimization (PSO) for heart disease detection
Published 2024“…RFE combines a dimensionality reduction process with a machine learning process where the least important features are iteratively removed until the best feature subset is obtained, while the PSO method is used to optimize the C and gamma parameters of SVM. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
18
Early detection of dengue disease using extreme learning machine
Published 2018“…Therefore, the proposed ELM model can be considered as an alternative algorithm to apply for early detection of Dengue disease.…”
Get full text
Get full text
Article -
19
Optimal resource allocation for NOMA wireless networks
Published 2022“…The major goal is to maximize the users’ maximum weighted sum rate. The suggested algorithm’s most notable feature is that it converges to the global optimal solution. …”
Get full text
Get full text
Article -
20
