Particle Swarm Optimization: A survey of historical and recent developments with hybridization perspectives

S Sengupta, S Basak, RA Peters - Machine Learning and Knowledge …, 2018 - mdpi.com
Particle Swarm Optimization (PSO) is a metaheuristic global optimization paradigm that has
gained prominence in the last two decades due to its ease of application in unsupervised …

A comprehensive review of the load forecasting techniques using single and hybrid predictive models

A Al Mamun, M Sohel, N Mohammad… - IEEE …, 2020 - ieeexplore.ieee.org
Load forecasting is a pivotal part of the power utility companies. To provide load-shedding
free and uninterrupted power to the consumer, decision-makers in the utility sector must …

Intrusion detection using sequences of system calls

SA Hofmeyr, S Forrest… - Journal of computer …, 1998 - content.iospress.com
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …

Malware classification with recurrent networks

R Pascanu, JW Stokes, H Sanossian… - … , Speech and Signal …, 2015 - ieeexplore.ieee.org
Attackers often create systems that automatically rewrite and reorder their malware to avoid
detection. Typical machine learning approaches, which learn a classifier based on a …

Optimal power flow: A bibliographic survey I: Formulations and deterministic methods

S Frank, I Steponavice, S Rebennack - Energy systems, 2012 - Springer
Over the past half-century, Optimal Power Flow (OPF) has become one of the most important
and widely studied nonlinear optimization problems. In general, OPF seeks to optimize the …

MtNet: a multi-task neural network for dynamic malware classification

W Huang, JW Stokes - Detection of Intrusions and Malware, and …, 2016 - Springer
In this paper, we propose a new multi-task, deep learning architecture for malware
classification for the binary (ie malware versus benign) malware classification task. All …

Malware classification with LSTM and GRU language models and a character-level CNN

B Athiwaratkun, JW Stokes - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Malicious software, or malware, continues to be a problem for computer users, corporations,
and governments. Previous research [1] has explored training file-based, malware …

Application of new deep genetic cascade ensemble of SVM classifiers to predict the Australian credit scoring

P Pławiak, M Abdar, UR Acharya - Applied Soft Computing, 2019 - Elsevier
In the recent decades, credit scoring has become a very important analytical resource for
researchers and financial institutions around the world. It helps to boost both profitability and …

Artificial immune systems as a novel soft computing paradigm

LND Castro, JI Timmis - Soft computing, 2003 - Springer
Artificial immune systems (AIS) can be defined as computational systems inspired by
theoretical immunology, observed immune functions, principles and mechanisms in order to …

Optimal power flow: A bibliographic survey II: Non-deterministic and hybrid methods

S Frank, I Steponavice, S Rebennack - Energy systems, 2012 - Springer
Over the past half-century, Optimal Power Flow (OPF) has become one of the most important
and widely studied nonlinear optimization problems. In general, OPF seeks to optimize the …