Search Results - (( development subset detection algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- development subset »
- subset detection »
- java application »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
3
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
4
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
6
Algorithm of face recognition by principal component analysis
Published 2002“…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
Get full text
Get full text
Article -
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
9
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
10
-
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
12
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
Get full text
Get full text
Article -
13
Quantitative analysis evaluation of image reconstruction algorithms between digital and analog PET-CT
Published 2023“…Results demonstrate that both OSEM and HYPER DPR reconstruction algorithms in digital PET-CT has greater spatial resolution, increased detection sensitivity and less image noise when compared to analog PET-CT. …”
Get full text
Get full text
Article -
14
-
15
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
16
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals
Published 2017“…Properly determining the discriminative fea-tures which characterize the inherent behaviors of electro-encephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
Get full text
Get full text
Get full text
Article -
17
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems (IDS). …”
Get full text
Get full text
Get full text
Article -
18
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals
Published 2018“…Properly determining the discriminative features which characterize the inherent behaviors of electroencephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
Get full text
Get full text
Article -
19
-
20
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
Get full text
Get full text
Thesis
