Search Results - (( data verification using algorithm ) OR ( evolution classification based algorithm ))
Search alternatives:
- evolution classification »
- classification based »
- verification using »
- data verification »
- using algorithm »
-
1
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…The proposed algorithm is grounded on the two famous metaheuristic algorithms: cuckoo search (CS) and covariance matrix adaptation evolution strategy (CMA-es). …”
Get full text
Get full text
Thesis -
2
-
3
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
4
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…These fine-tuning techniques continue to be the object of ongoing research. Differential evolution (DE) is a simple yet powerful population-based metaheuristic. …”
Get full text
Get full text
Article -
5
Differential evolution for neural networks learning enhancement
Published 2008“…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
Get full text
Get full text
Get full text
Thesis -
6
Feature selection optimization using hybrid relief-f with self-adaptive differential evolution
Published 2017“…Hence, feature selection is embedded to select the most meaningful features based on their rank. Differential evolution (DE) is one of the evolutionary algorithms that are widely used in various classification domains. …”
Get full text
Get full text
Get full text
Article -
7
Genetic ensemble biased ARTMAP method of ECG-Based emotion classification
Published 2012Get full text
Get full text
Conference or Workshop Item -
8
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…The spectral features were performed by employing the relative spectral powers of delta (δRP), theta (θRP), alpha (αRP), beta (βRP), and gamma (γRP). The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
Get full text
Get full text
Conference or Workshop Item -
9
Email spam classification based on deep learning methods: A review
Published 2025“…Email spam is a significant issue confronting both email consumers and providers. The evolution of spam filtering has progressed considerably, transitioning from basic rule-based filters to more sophisticated machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Intersection Features For Android Botnet Classification
Published 2019“…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis -
12
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
13
Analysis on target detection and classification in LTE based passive forward scattering radar
Published 2016“…Thus, the aim of this paper is to show the feasibility of passive FSR for moving target detection and classification by experimental analysis and results. The signal source is coming from the latest technology of 4G Long-Term Evolution (LTE) base station. …”
Get full text
Get full text
Get full text
Article -
14
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Improving Ant Swarm Optimization With Embedded Vaccination For Optimum Reducts Generation
Published 2011“…Unlike a conventional PSOIACO algorithm, this hybrid algorithm shows improvement of the classification accuracy in its generated rough reducts to solve NP-Hard problem. …”
Get full text
Get full text
Conference or Workshop Item -
16
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
17
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…Hence, this research has proposed three enhanced frameworks, namely, Optimized Gravitational-based (OGC), Density-Based Particle Swarm Optimization (DPSO), and Variance-based Differential Evolution with an Optional Crossover (VDEO) frameworks for data clustering. …”
Get full text
Get full text
Thesis -
18
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
19
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
20
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…Subsequently, an extensive analysis of existing fault tolerance techniques based on eight constraints is presented. Many prior studies have provided classifications for fault tolerance systems. …”
Get full text
Get full text
Article
