Results 51 to 60 of about 17,412 (237)

TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-based Intrusion Detection System [PDF]

open access: yes, 2019
Intrusion detection systems (IDS) play a pivotal role in computer security by discovering and repealing malicious activities in computer networks. Anomaly-based IDS, in particular, rely on classification models trained using historical data to discover ...
Comuzzi, Marco   +2 more
core   +1 more source

Modified grey wolf method for optimization of PM motors [PDF]

open access: yesITM Web of Conferences, 2019
The paper presents an algorithm and computer software for the optimization of electromagnetic devices. The mathematical model of the optimization method was presented. The modification of the classical grey wolf algorithm was developed. The modification consists in decreasing the coefficient responsible for the possibility of migration individuals in ...
openaire   +2 more sources

Prediction Model for Dissolved Gas Concentration in Transformer Oil Based on Modified Grey Wolf Optimizer and LSSVM with Grey Relational Analysis and Empirical Mode Decomposition

open access: yesEnergies, 2020
Oil-immersed transformer is one of the most important components in the power system. The dissolved gas concentration prediction in oil is vital for early incipient fault detection of transformer.
Bing Zeng   +6 more
semanticscholar   +1 more source

A machine learning route between band mapping and band structure [PDF]

open access: yes, 2020
The electronic band structure (BS) of solid state materials imprints the multidimensional and multi-valued functional relations between energy and momenta of periodically confined electrons.
Bauer, Stefan   +11 more
core   +4 more sources

Hybrid Harmony Search Algorithm With Grey Wolf Optimizer and Modified Opposition-Based Learning

open access: yesIEEE Access, 2019
Most metaheuristic algorithms, including harmony search (HS), suffer from parameter selection. Many variants have been developed to cope with this problem and improve algorithm performance. In this paper, a hybrid algorithm of HS with grey wolf optimizer
Alaa A. Alomoush   +4 more
doaj   +1 more source

Individualized Atrophy‐Based Prediction of Dementia Progression in Familial Frontotemporal Lobar Degeneration With Bayesian Linear Mixed‐Effects Modeling

open access: yesAnnals of Neurology, EarlyView.
Objective Age of symptom onset is highly variable in familial frontotemporal lobar degeneration (f‐FTLD). Accurate prediction of onset would inform clinical management and trial enrollment. Prior studies indicate that individualized maps of brain atrophy can predict conversion to dementia in f‐FTLD.
Shubir Dutt   +82 more
wiley   +1 more source

Stochastic Fractal Based Multiobjective Fruit Fly Optimization [PDF]

open access: yes, 2017
The fruit fly optimization algorithm (FOA) is a global optimization algorithm inspired by the foraging behavior of a fruit fly swarm. In this study, a novel stochastic fractal model based fruit fly optimization algorithm is proposed for multiobjective ...
Zuo, C., Wu, L., Zeng, Z.-F., Wei, H.-L.
core   +3 more sources

Analysis of Swarm Intelligence Based ANN Algorithms for Attacking PUFs

open access: yesIEEE Access, 2021
Physical Unclonable Functions (PUFs) are used for authentication and generation of secure cryptographic keys. However, recent research work has shown that PUFs, in general, are vulnerable to machine learning modeling attacks.
Ahmed Oun   +2 more
doaj   +1 more source

A Novel Global MPP Tracking of Photovoltaic System Based on Whale Optimization Algorithm [PDF]

open access: yes, 2016
To harvest maximum amount of solar energy and to attain higher efficiency, photovoltaic generation (PVG) systems are to be operated at their maximum power point (MPP) under both variable climatic and partial shaded condition (PSC).
Kumar, C. S. (Cherukuri)   +1 more
core   +1 more source

A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System

open access: yesMathematics, 2022
Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service’s availability and consumers’ privacy. A network Intrusion Detection System (IDS) aims to detect aberrant traffic behavior that firewalls cannot detect.
Abdullah Alzaqebah   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy