Search Results - (( security detection method algorithm ) OR ( parameter optimization method algorithm ))

Refine Results
  1. 1

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimization of turning parameters using genetic algorithm method by Shah Izwandi, Mohd Zawawi

    Published 2008
    “…This study about development of optimization for turning parameters based on the Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Parameters optimization of surface grinding process with particles swarm optimization, gravitational search, and sine cosine algorithms: a comparative analysis by Asrul, Adam

    Published 2018
    “…The efficiency of the three algorithms are evaluated and compared with previous results obtained by other optimization methods on similar studies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Optimization of PID parameters for hydraulic positioning system utilizing variable weight Grey-Taguchi and particle swarm optimization by Nur Iffah, Mohamed Azmi

    Published 2014
    “…Particle swarm optimization algorithm (PSO) is one of the artificial intelligence methods. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Optimization of turning parameters using ant colony optimization by Mohamad Nazri, Semoin

    Published 2008
    “…The project objectives are to develop Ant Colony Optimization (ACO) algorithm for CNC turning process and to optimize turning parameters for minimized production cost per unit. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail by Foo, Fong Yeng, Lau, Gee Choon, Ismail, Zuhaimy

    Published 2014
    “…Trial and error often serves as the best method to determine the parameter. Therefore, a good optimization technique is required for identify the best parameter in minimizing the forecast errors. …”
    Get full text
    Get full text
    Research Reports
  17. 17
  18. 18

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  19. 19

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Application Of Genetic Algorithms For Robust Parameter Optimization by Belavendram, N.

    Published 2010
    “…Genetic algorithms (GA) are fairly recent in this respect but afford a novel method of parameter optimization. …”
    Get full text
    Get full text
    Article