Search Results - (( based detection method algorithm ) OR ( parallel selection method algorithm ))
Search alternatives:
- parallel selection »
- method algorithm »
- based detection »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
Get full text
Get full text
Thesis -
3
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
New CFAR algorithm and circuit development for radar receiver
Published 2020“…Therefore, the MSS-CA-CFAR is chosen to implement by practical digital circuit and there is another important feature in the MSS-CFAR algorithm that is parallel processing since the spike selection process is done at the same time with summing of samples process that makes this algorithm much less in processing time from any other algorithm using the same environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Parallel algorithms on some numerical techniques using PVM platform on a cluster of workstations
Published 2002“…In this paper, a few parallel algorithms are explained in solving one dimensional heat model problem using Parallel Virtual Machine (PVM). …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
7
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…To conclude, multi objective parallel genetic algorithm can automatically tune feed forward neural network to classify the dataset with a good classification rate.…”
Get full text
Get full text
Thesis -
8
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
9
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Guided genetic algorithm for solving unrelated parallel machine scheduling problem with additional resources
Published 2022“…Additionally, an appropriate selection of GA operators was also experimented. The guide genetic algorithm (GGA) is not used to solve the unspecified dynamic UPMR. …”
Get full text
Get full text
Get full text
Article -
11
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
13
-
14
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
15
-
16
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
ROA-CONS: raccoon optimization job scheduling
Published 2021“…In comparison with other well-known job scheduling algorithms, the simulation assesses the effectiveness of the proposed method. …”
Get full text
Get full text
Article -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis
