Search Results - (( (evolution OR solution) detection system algorithm ) OR ( using optimization based algorithm ))
Search alternatives:
- system algorithm »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
2
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
4
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…Both architectures gave precise results for different selections of chirp rate that could fit with system specifications. The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
5
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices
Published 2021“…Another part of this work focuses on enhancing the stability of the power system using distributed generator (DG). The proposed solution is based on the optimization method developed from a combination of the Artificial Bee Colony and Hill Climbing algorithms (ABC-HC) to give the optimal placement and sizing of DG units to be deployed in the system. …”
Get full text
Get full text
Thesis -
7
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. Based on that analysis, this research suggests a hybrid algorithm: the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy). …”
Get full text
Get full text
Get full text
Thesis -
8
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. Based on that analysis, this research suggests a hybrid algorithm: the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy). …”
Get full text
Get full text
Get full text
Thesis -
9
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
Get full text
Get full text
Thesis -
10
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
11
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005“…In this paper we examine the performance of a micro-Genetic Algorithm-based multi-user detector. Our simulation shows that μGA achieves a performance close to optimal detector.…”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
15
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…In this paper, we introduce a new adaptive DNA coinpitting algorithm by using Poiymcruse Chain Rearlion (PCR). …”
Get full text
Get full text
Book Section -
16
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…Fuzzy system is a rule-based system by using human experts which hold the truth values or membership values to make a particular decision while fuzzy modelling is a process of identifying the fuzzy parameter. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Neural network algorithm-based fall detection modelling
Published 2020“…This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
20
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…A new detection algorithm based on QR decomposition, denoted as LC-QR, is proposed. …”
Get full text
Get full text
Thesis
