Search Results - (( based optimization based algorithm ) OR ( initial detection method algorithm ))

Refine Results
  1. 1

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…In conclusion, this study presented a novel hybrid evolutionary algorithm based on the combination of AHP with GBCS to specify optimal RFID reader positions and amount based on the working train station domain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…The focus of this research is on the development of a model that can optimize the initial parameters of FLN based on MRPSO to obtain an optimal set of initial parameters for FLN, thus, creating an optimal FLN classifier named as MRPSO-FLN which can improve the efficacy of network intrusion on data sets that contain instances of multiple classes of attacks. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2007
    “…Genetic algorithms have several steps. For the initial population, 200 pixels will be taken to be the initial population in randomly. …”
    Get full text
    Get full text
    Thesis
  5. 5

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. …”
    Get full text
    Get full text
    Article
  6. 6

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
    Get full text
    Get full text
    Thesis
  9. 9

    Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee by Chong , Hue Yee

    Published 2023
    “…As such, its training can reach stability in a shorter time compared to the gradient-descent based methods. To achieve optimal RBFN-DDA performance, HS (or GSA) is proposed to optimize the center and the width of each hidden unit in a trained RBFN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption by Alsammak I.L.H., Mahmoud M.A., Gunasekaran S.S., Ahmed A.N., Alkilabi M.

    Published 2024
    “…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
    Article
  13. 13
  14. 14

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…Unlike traditional methods that usually start with detection and followed by denoising, the model initially leverages the powerful ability of deep CNN architecture to separate noise from noisy image, then adopts PSO to pinpoint the most optimized threshold values for detecting impulse noisy pixels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity by Khameneh, Azadeh Zahedi, Ghaznavi, Mehrdad, Kilicman, Adem, Mahad, Zahari, Mardani, Abbas

    Published 2024
    “…The clustering results are analyzed based on several indexes. This analysis shows the efficiency of the proposed algorithm compared to the traditional clustering methods. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.…”
    Get full text
    Get full text
    Article
  16. 16

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  17. 17

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…The initial testing result shows that our system is effective in on-line detection of file modification.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…Most of the existing algorithms consider the noise filtering step precedes trajectory segmentation step which mean that there is no preprocessing method to partition trajectory into set of segments and remove noise points in real time with low computational cost. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction by Hui, Ng Suk

    Published 2024
    “…Q.Clear, a Bayesian Penalised Likelihood (BPL) algorithm, has demonstrated notable advancements in clinical image quality and quantification, particularly in detecting subtle abnormalities. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Optimized Decision Forest for Website Phishing Detection by Balogun, A.O., Mojeed, H.A., Adewole, K.S., Akintola, A.G., Salihu, S.A., Bajeh, A.O., Jimoh, R.G.

    Published 2021
    “…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
    Get full text
    Get full text
    Article