Search Results - ((((section algorithm) OR ((evolution OR solution) algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
Get full text
Get full text
Book Section -
2
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
Published 2020“…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin
Published 2012“…A Neural Network Method and Convexity Defects Algorithm is used to enable the system to detect hand gesture without any additional hardware. …”
Get full text
Get full text
Book Section -
4
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Identifying types of Partial Discharge (PD) is very crucial in order to prepare and provide solutions before complete breakdown occurs. Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
Get full text
Get full text
Book Section -
5
Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mardhiah Abdul Jalil
Published 2022“…Their facial expression is measure and determine based on Rating of Perceived Exertion (RPE) scale. The object detection machine learning model used in this project is Single Shot Detector (SSD) algorithm. …”
Get full text
Get full text
Get full text
Book Section -
6
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
8
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
9
Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff
Published 2018“…This thesis proposed an efficient algorithm, namely, the Quality of Service (QoS) and Energy Efficient Aware (QEEA). …”
Get full text
Get full text
Book Section -
10
Crossover and mutation operators of genetic algorithms
Published 2017“…Genetic algorithms (GA) are stimulated by population genetics and evolution at the population level where crossover and mutation comes from random variables. …”
Get full text
Get full text
Get full text
Article -
11
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
13
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
Get full text
Get full text
Article -
14
Crossover and mutation operators of genetic algorithms
Published 2017“…Genetic algorithms (GA) are stimulated by population genetics and evolution at the population level where crossover and mutation comes from random variables. …”
Get full text
Get full text
Get full text
Article -
15
New synchronization protocol for distributed system with TCP extension
Published 2013“…Hence, the presented solutions are unable to identify active processes that are currently related to critical sections and dead in the network communication. …”
Get full text
Get full text
Thesis -
16
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
17
Subspace Techniques for Brain Signal Enhancement
Published 2009“…Later, the performance of the algorithms is assessed in their abilities to detect the latencies of the P100, P200 and P300 components. …”
Get full text
Get full text
Book Section -
18
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…However, the MBGWO has several issues in finding a good quality solution. Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
19
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
20
Differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. …”
Get full text
Get full text
Conference or Workshop Item
