Search Results - (( adoption two different detection algorithm ) OR ( adoption _ difference evolution algorithm ))
Search alternatives:
- difference evolution »
- evolution algorithm »
- two different »
- adoption two »
-
1
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
2
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
3
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
4
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
5
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
Get full text
Get full text
Thesis -
8
-
9
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…In order to find the best filtration algorithm, two stages were adopted in this study. The first stage was the validation of the performance of the previous algorithms. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. …”
Get full text
Get full text
Article -
11
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…Research works published from the year 2018 to 2022 are identified in terms of problem representation and evolutionary strategies adopted. The mechanisms and strategies used in evolutionary algorithms to address different types of combinatorial optimization problems are discovered. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
A comparative study for parameter selection in online auctions
Published 2009“…In this work, three different models of genetic algorithms are considered. …”
Get full text
Get full text
Get full text
Thesis -
13
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
14
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
15
-
16
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022“…MRFO is a recently new introduced algorithm that consists of strategy of foraging adopted by Manta Ray while Gradient-based Mutation (GbM) is a feasibility-and solution repair strategy adopted from ϵ-Matrix-Adaptation Evolution Strategy (ϵ-MAES). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A Bayesian probability model for Android malware detection
Published 2021“…The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
Get full text
Get full text
Get full text
Article -
19
Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme
Published 2014“…The percentage difference is 2.1%,compared with the full feedback method, with only 0.5% degradation. …”
Get full text
Get full text
Thesis -
20
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article
