Search Results - (( simulation optimization method algorithm ) OR ( security classification techniques algorithm ))
Search alternatives:
- security classification »
- method algorithm »
- techniques »
-
1
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
Get full text
Get full text
Thesis -
2
K-NN classifier for data confidentiality in cloud computing
Published 2014“…In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. …”
Get full text
Get full text
Conference or Workshop Item -
3
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
Get full text
Get full text
Article -
4
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
5
-
6
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
Get full text
Get full text
Thesis -
7
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
8
Optimization of turning parameters using genetic algorithm method
Published 2008“…The simulation based on Genetic Algorithm are successful develop and the optimum parameters values are obtained from the simulation.…”
Get full text
Get full text
Undergraduates Project Papers -
9
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
10
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
11
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
Get full text
Get full text
Thesis -
12
A discrete simulated kalman filter optimizer for combinatorial optimization problems
Published 2022“…An example of a numerical algorithm is the simulated Kalman filter (SKF). Various method has been introduced as an extension of a numerical algorithm to adapt it to a discrete search space. …”
Get full text
Get full text
Thesis -
13
VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING
Published 2022“…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
Get full text
Get full text
Get full text
Article -
14
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
15
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
Get full text
Get full text
Thesis -
16
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…Therefore, the effectiveness of route planning is very essential. The method to study route optimization is called shortest path method. …”
Get full text
Get full text
Thesis -
17
File integrity monitor scheduling based on file security level classification
Published 2011“…This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Improved particle swarm optimization by fast annealing algorithm
Published 2019“…We also apply the algorithm in clustering problem, and the results shows that the proposed method has better accuracy than the optimization methods.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Asynchronous simulated kalman filter optimization algorithm
Published 2018“…Simulated Kalman filter (SKF) is an optimization algorithm which is inspired by Kalman filtering method. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In this research, two novel estimation-based metaheuristic optimization algorithms, named as Simulated Kalman Filter (SKF), and single-solution Simulated Kalman Filter (ssSKF) algorithms are introduced for global optimization problems. …”
Get full text
Get full text
Thesis
