Search Results - (((evolution OR solution) algorithm) OR (((detection algorithm) OR (control algorithm))))
-
1
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The third modification improves the controlled parameter of the MBGWO algorithm using indicators from the search process to refine the solution. …”
Get full text
Get full text
Thesis -
2
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
3
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
4
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
Get full text
Get full text
Thesis -
6
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005“…Genetic Algorithms (GA) is a search and optimizes technique that works by estimating multiple solutions in order to come with the best estimated solution. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…Surface defect segmentation algorithms in Automatic Optical Inspection (AOI) system for modern manufacturing industries provide solutions to quality control with speed, volume and traceability. …”
Get full text
Get full text
Thesis -
8
Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin
Published 2012“…A Neural Network Method and Convexity Defects Algorithm is used to enable the system to detect hand gesture without any additional hardware. …”
Get full text
Get full text
Book Section -
9
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
Published 2018“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Article -
10
A four stage image processing algorithm for detecting and counting of bagworm, Metisa plana Walker (Lepidoptera: Psychidae)
Published 2021“…After some improvements on training dataset and marking detected bagworm with bounding box, a deep learning algorithm with Faster Regional Convolutional Neural Network (Faster R-CNN) algorithm was applied leading to the percentage of the detection accuracy increased up to 100% at a camera distance of 30 cm in close conditions. …”
Get full text
Get full text
Article -
11
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
12
Optimal HE-PWM inverter switching patterns using differential evolution algorithm
Published 2012“…The DE algorithm needs a relative small amount of generations to reach accurate solutions with appropriate control parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
14
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
15
SMART: a subspace based malicious peers detection algorithm for P2P systems
Published 2013“…Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. …”
Get full text
Get full text
Get full text
Article -
16
Multiobjective design optimization of a nano-CMOS voltage-controlled oscillator using game theoretic-differential evolution
Published 2015“…Examination on the quality of the solutions across the Pareto frontier obtained using these algorithms was carried out using the hypervolume indicator (HVI). …”
Get full text
Get full text
Article -
17
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. This dynamic model is based on the first principles of the Quadrotor: Propeller model and its force as well as moments generation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
CS-FuzGA-PTS: Maximizing fault detection through optimizing t-way test suite prioritization based on boundary value analysis
Published 2024“…The core of CS-FuzGA-PTS lies in a new optimization algorithm called CS-FuzGA as a search algorithm. The algorithm integrates adaptive fuzzy logic-controlled Genetic Algorithm (GA) operators with Cuckoo Search (CS). …”
Get full text
Get full text
Get full text
Article -
19
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…In the last experiment, the results showed that DE and EP algorithms can generate superior controllers whilst PDE is only capable to generate sub-optimal controllers. …”
Get full text
Get full text
Get full text
Thesis
