Search Results - (( wave optimization based algorithm ) OR ( attack selection method algorithm ))

Refine Results
  1. 1
  2. 2

    Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm by Nallagownden, P., Alhaj, H.M.M., Sarwar, M.B.

    Published 2015
    “…This paper, describes a method to maximize the pneumatic system efficiency using optimization technique based on Genetic algorithm. This method involves an extraction of maximum incident wave energy corresponding to the wave height, determining of the best deep water length and maximizing the applied damping ratio which can lead to an increase in the pneumatic system efficiency. …”
    Get full text
    Get full text
    Article
  3. 3

    Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model by Kaur, Arvinder, Kumar, Yugal

    Published 2021
    “…In the proposed diagnostic model, a water wave optimization (WWO) algorithm was implemented for improving the diagnosis accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  7. 7

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  8. 8

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction by Alqushaibi, A., Abdulkadir, S.J., Rais, H.M., Al-Tashi, Q., Ragab, M.G., Alhussian, H.

    Published 2021
    “…Therefore, the wind plays an essential role in the oceanic atmosphere and contributes to the formation of waves. This paper proposes an enhanced weight-optimized neural network based on Sine Cosine Algorithm (SCA) to accurately predict the wave height. …”
    Get full text
    Get full text
    Article
  11. 11

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
    Get full text
    Get full text
    Article
  12. 12

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Distributed Denial of Service detection using hybrid machine learning technique by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive feature selection for denial of services (DoS) attack by Yusof, Ahmad Riza'ain, Udzir, Nur Izura, Selamat, Ali, Hamdan, Hazlina, Abdullah @ Selimun, Mohd Taufik

    Published 2017
    “…In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
    Get full text
    Get full text
    Conference or Workshop Item