Search Results - (( evolution optimization detection algorithm ) OR ( java application swarm algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Robust multi-user detection based on hybrid grey wolf optimization by Ji, Yuanfa, Fan, Z ., Sun, X., Wang, S., Yan, S., Wu, S., Fu, Q., Kamarul Hawari, Ghazali

    Published 2020
    “…In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
    Get full text
    Get full text
    Article
  4. 4

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation by Noor Zaihan, Jamal

    Published 2019
    “…Comparative studies have been performed in between GWO and the other well-known methods such as Differential Evolution (DE), Particle Swarm Optimizer (PSO) and Biogeographybased Optimizer (BBO), to demonstrate the efficiency of the GWO. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimizing Neural Network Prediction of Composite Fatigue Life Under Variable Amplitude Loading Using Bayesian Regularization by Megat-Yusoff, Puteri Sri Melor

    Published 2009
    “…The text then covers structural health monitoring and damage detection in composites, addresses mechanical properties, and discusses design, analysis, and materials selection. …”
    Get full text
    Get full text
    Book Section
  17. 17

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…There has been noteworthy research on image based steganography techniques to overcome the various challenges i.e. lower embedding capacity, imperceptibility, embedding efficiency and robustness against steganalysis detection attacks. However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…Due to the evolution of high processing microprocessors, the model predictive control (MPC) has been widely used in power electronic applications. …”
    Get full text
    Get full text
    Get full text
    Thesis