Search Results - (((evolutionary OR solution) algorithm) OR (((detection algorithm) OR (connection algorithm))))
Search alternatives:
-
1
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In a source searching task, two possible scenarios can occur: source detected and source not detected. In this study, a complete solution to the two scenarios through an adaptive algorithm switching strategy is explored. …”
Get full text
Get full text
Thesis -
2
-
3
Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency
Published 2018“…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. In this work, we proposed an evolutionary cost-cognizant regression testing approach that prioritizes test case according to the rate of severity detection of test cases connected with dependent faults using genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
4
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
Published 2018“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Article -
7
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
8
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Design of digital circuit structure based on evolutionary algorithm method
Published 2008“…Evolutionary Algorithms (EAs) cover all the applications involving the use of Evolutionary Computation in electronic system design. …”
Get full text
Get full text
Get full text
Article -
10
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…First, we enhance the famous multiobjective evolutionary algorithms, which is a non-dominated sorting genetic algorithm (NSGA-II). …”
Get full text
Get full text
Get full text
Article -
11
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Besides DEA, Evolutionary Programming (EP), Firefly Algorithm (FA) and Cuckoo Search Algorithm (CS) were also incorporated in the sizing algorithm for performance comparison. …”
Get full text
Get full text
Thesis -
12
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
Get full text
Get full text
Thesis -
13
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
14
Fusion of linear and nonlinear functional model for cadastral network adjustment / Nazurah Syahzanani Amiruddin
Published 2024“…With the vector displacement of less than 0.050m, it is proven that the hybrid algorithm is effective and the solution manage to preserve the positional accuracy. …”
Get full text
Get full text
Student Project -
15
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
16
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
Get full text
Get full text
Thesis -
17
Pareto ensembles for evolutionary synthesis of Neurocontrollers in a 2D maze-based video game
Published 2013“…A system using multi-objective evolutionary algorithm is developed, which is called as Pareto Archived Evolution Strategy Neural Network(PAESNet), with the attempt to find a set of Pareto optimal solutions by simultaneously optimizing two conflicting objectives. …”
Get full text
Get full text
Article -
18
Optimal Integration of Active and Reactive Power DGs in Distribution Network via a Novel Multi-Objective Intelligent Technique
Published 2025Subjects:Conference paper -
19
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
20
Pareto Ensembles for evolutionary Synthesis of Neurocontrollers in a 2D Maze-based video game
Published 2013“…A system using multi-objective evolutionary algorithm is developed, which is called as Pareto Archived Evolution Strategy Neural Network(PAESNet), with the attempt to find a set of Pareto optimal solutions by simultaneously optimizing two conflicting objectives. …”
Get full text
Get full text
Article
