Search Results - (( simulation optimization method algorithm ) OR ( security classification based algorithm ))

Refine Results
  1. 1

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optimization of turning parameters using genetic algorithm method by Shah Izwandi, Mohd Zawawi

    Published 2008
    “…The simulation based on Genetic Algorithm are successful develop and the optimum parameters values are obtained from the simulation.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A discrete simulated kalman filter optimizer for combinatorial optimization problems by Suhazri Amrin, Rahmad

    Published 2022
    “…An example of a numerical algorithm is the simulated Kalman filter (SKF). Various method has been introduced as an extension of a numerical algorithm to adapt it to a discrete search space. …”
    Get full text
    Get full text
    Thesis
  11. 11

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    K-NN classifier for data confidentiality in cloud computing by Zardari, M.A., Jung, L.T., Zakaria, N.

    Published 2014
    “…What data need security and what data do not need security. In this paper, we propose a data classification approach based on data confidentiality. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Data classification based on confidentiality in virtual cloud environment by Zardari, M.A., Jung, L.T., Zakaria, M.N.B.

    Published 2014
    “…The aim of this study is to provide suitable security to data based on the security needs of data. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…Therefore, the effectiveness of route planning is very essential. The method to study route optimization is called shortest path method. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria by Zakaria, Mohd Fathi

    Published 2010
    “…Extensive testing and training of the proposed ANN based apprnach indicates its viability for power system steady state stability classification assessment.…”
    Get full text
    Get full text
    Article
  18. 18

    Improved particle swarm optimization by fast annealing algorithm by Bashath, Samar, Ismail, Amelia Ritahani

    Published 2019
    “…We also apply the algorithm in clustering problem, and the results shows that the proposed method has better accuracy than the optimization methods.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Asynchronous simulated kalman filter optimization algorithm by Zuwairie, Ibrahim, Nor Azlina, Ab. Aziz, Nor Hidayati, Abd Aziz, Tasiransurini, Ab Rahman

    Published 2018
    “…Simulated Kalman filter (SKF) is an optimization algorithm which is inspired by Kalman filtering method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification by Ghanem, W.A.H.M, El-Ebiary, Y.A.B., Abdulnab, M., Tubishat, M., Alduais, N.A.M., Nasser, A.B., Abdullah, N., Al-wesabi, O.A.

    Published 2021
    “…This article proposes a cyber-intrusion detecting system classification with MLP trained by a hybrid metaheuristic algorithm and feature selection based on multi-objective wrapper method. …”
    Get full text
    Get full text
    Conference or Workshop Item