Search Results - (( feature detection method algorithm ) OR ( changes optimization method algorithm ))
Search alternatives:
- changes optimization »
- feature detection »
- method algorithm »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
2
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Consequently, optimization algorithms including binary gravitation search algorithm (BGSA) and binary particle swarm optimization (BPSO), were employed to identify the optimal channels for gender classification. …”
Get full text
Get full text
Article -
3
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…As such, its training can reach stability in a shorter time compared to the gradient-descent based methods. To achieve optimal RBFN-DDA performance, HS (or GSA) is proposed to optimize the center and the width of each hidden unit in a trained RBFN. …”
Get full text
Get full text
Get full text
Thesis -
4
Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model
Published 2020“…A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
Get full text
Get full text
Get full text
Thesis -
6
Furrow and crypt detection using modified ant colony optimization for iris recognition / Zaheera Zainal Abidin
Published 2016“…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
Get full text
Get full text
Thesis -
7
Furrow and crypt detection using Modified Ant Colony Optimization for iris recognition / Zaheera Zainal Abidin
Published 2016“…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
Get full text
Get full text
Book Section -
8
Face emotion recognition using artificial intelligence techniques
Published 2008“…The fitness functions are utilized by genetic algorithm (GA) to find the optimized values of minor axes. …”
Get full text
Thesis -
9
Iban Plaited Mat Motif Classification using Adaptive Smoothing
Published 2024“…To address this issue, an improved classification method with adaptive smoothing is proposed. This method utilizes dynamic thresholds for edge detection and uses morphological operations to enhance the smoothed edges. …”
Get full text
Get full text
Thesis -
10
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
Get full text
Get full text
Get full text
Thesis -
11
Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer
Published 2023“…This algorithm named JAABC5ROC is the enhancement of Artificial Bee Colony (ABC) variant, JA-ABC5 by combining with Rate of Change (ROC)\. …”
Get full text
Get full text
Thesis -
12
Aerial imagery paddy seedlings inspection using deep learning
Published 2022“…Experimental results showed that our proposed methods were capable of detecting the defective paddy rice seedlings with the highest precision and an F1-Score of 0.83 and 0.77, respectively, using a one-stage pretrained object detector called EfficientDet-D1 EficientNet.…”
Get full text
Get full text
Article -
13
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
14
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
15
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
16
-
17
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
18
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
20
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
