Search Results - (( subset detection method algorithm ) OR ( wave optimization method algorithm ))*

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Experiments demonstrate that ensemble classifier learning method produces better accuracy mining data streams and selecting subset of relevant features comparing other single classifiers. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A Naïve-Bayes classifier for damage detection in engineering materials by Addin, O., Salit, Mohd Sapuan, Mahdi Ahmad Saad, Elsadig, Othman, Mohamed

    Published 2007
    “…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Inversion Of Surface Wave Phase Velocity Using New Genetic Algorithm Technique For Geotechnical Site Investigation by Hamimu, La

    Published 2011
    “…Therefore the use of genetic algorithm (GA) optimization technique which is one of nonlinear optimization methods is an appropriate choice to solve surface wave inversion problem having high nonlinearity and multimodality. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…The database is divided into subsets, where each subset represents one of 10 different individuals. …”
    Get full text
    Get full text
    Article
  10. 10

    Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm by Nallagownden, P., Alhaj, H.M.M., Sarwar, M.B.

    Published 2015
    “…This paper, describes a method to maximize the pneumatic system efficiency using optimization technique based on Genetic algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  12. 12

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  13. 13

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
    Get full text
    Get full text
    Article
  18. 18

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
    Get full text
    Get full text
    Article
  19. 19

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…The ant colony optimisation (ACO) algorithm have been used to select feature subset. …”
    Get full text
    Get full text
    Get full text
    Thesis