Search Results - (( based optimization based algorithm ) OR ( pattern detection using algorithm ))
Search alternatives:
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
2
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…In accordance with the result, this article proposes a novel chew count estimation based on particle swarm optimization (PSO). First, the base of the algorithm is developed based on counting the peak of the chewing signal. …”
Get full text
Get full text
Article -
3
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
4
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…In accordance with the result, this article proposes a novel chew count estimation based on particle swarm optimization (PSO). First, the base of the algorithm is developed based on counting the peak of the chewing signal. …”
Get full text
Get full text
Get full text
Article -
5
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…In this research, technique selection is done by doing some literature review to find the best one and also studying about the algorithm of each technique has. The result of hereditary ratio will be gained by implementing statistical percentage based on average differences of threshold value. …”
Get full text
Get full text
Thesis -
6
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
7
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
8
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
9
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
Get full text
Get full text
Thesis -
10
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
Get full text
Thesis -
11
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…The ADAM optimizer effectively tackles challenges in continuous parameter optimization by dynamically updating the model's weights and biases, adapting the learning rate for each parameter based on accumulated historical gradient information to achieve more efficient minimization of the loss function during training. …”
Get full text
Get full text
Get full text
Article -
12
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Detecting lung cancer region from CT image using meta-heuristic optimized segmentation approach
Published 2022“…In this paper, the butterfly optimization algorithm-based K-means clustering (BOAKMC) method is introduced for reducing CT image segmentation uncertainty. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Classification of Emphysema Patterns in Computed Tomography Based On Gabor Filter
Published 2015“…In this research, a Gabor-based emphysema classification algorithm is proposed. …”
Get full text
Get full text
Final Year Project -
16
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
17
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
18
Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq
Published 2024“…Combining Local Binary Patterns (LBP) based texture features and deep learning features resulted in the creation of the fused features vector which was then optimized using Binary Dragonfly Algorithm (BDA) and Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Thesis -
19
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
20
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis
