Search Results - (( evolution computing techniques ) OR ( evolution detection technique ))
Search alternatives:
- computing techniques »
- evolution detection »
-
1
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
Get full text
Get full text
Thesis -
2
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
Get full text
Get full text
Thesis -
5
Metric-based code smell detection technique for python software
Published 2018“…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
Get full text
Get full text
Thesis -
6
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
Get full text
Get full text
Get full text
Article -
7
Lattice Sphere Detection Techniques In Block Data Transmission And Multiuser Wireless Systems
Published 2013“…Owing to its high computational load, lattice sphere detection (LSD) technique and its variants had been proposed. …”
Get full text
Get full text
Thesis -
8
Antipatterns detection approaches in object-oriented design: a literature review
Published 2012“…Design pattern detection is a useful technique for gaining knowledge on the design issues of existing systems and improves the system's comprehension, which consequently enhance the software maintainability and evolution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A wireless precoding technique for millimetre-wave MIMO system based on SIC-MMSE
Published 2019“…To improve the conventional mm-wave MIMO nodal detection and coordination performance, the system processes data using symbolized error vector technique for linearization. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Segmentation of Retinal Vasculature using Active Contour Models (Snakes)
Published 2009“…Active contour model (snake) that based on level sets, techniques of curve evolution, and Mumford-Shah functional for segmentation is then used to segment out the detected retinal vessel and produce a complete retinal vasculature. …”
Get full text
Final Year Project -
11
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…The search for an effective nature-inspired optimization technique has certainly continued for decades. In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee
Published 2004“…The report will cover the literature review that started with an introduction to computer auditing, introduction to data mining, data mining techniques (classification, neural network and sequential analysis), and the existing data mining software. …”
Get full text
Get full text
Thesis -
13
Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin
Published 2012“…With the help of webcam, human can interact with computer by using their hand gesture. With this technique we can substitute the use of mouse or keyboard to control slide presentation. …”
Get full text
Get full text
Book Section -
14
Digital technologies evolution in swiftlet farming: a systematic literature review
Published 2024“…The findings were classified into three main themes: smart monitoring and control systems, advanced bird detection techniques, sustainable practices and innovative approaches, specifically in the manufacture of edible bird nests. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
-
17
Mobile Application: Mobile Assistance for Visually Impaired People - Speech Interface System (SIS)
Published 2023Conference Paper -
18
Enhanced Parallel Deep Learning for Malware Detection (EPDL-MD) Model
Published 2026journal::journal article -
19
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
20
Object detection and classification using few-shot learning in smart agriculture: A scoping mini review
Published 2022“…Its evolution over the previous two decades can be seen as the pinnacle of computer vision advancement. …”
Get full text
Get full text
Get full text
Get full text
Article
