Search Results - (( features detection method algorithm ) OR ( changes optimization based algorithm ))
Search alternatives:
- changes optimization »
- features detection »
- method algorithm »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Consequently, optimization algorithms including binary gravitation search algorithm (BGSA) and binary particle swarm optimization (BPSO), were employed to identify the optimal channels for gender classification. …”
Get full text
Get full text
Article -
3
Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model
Published 2020“…A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…As such, its training can reach stability in a shorter time compared to the gradient-descent based methods. To achieve optimal RBFN-DDA performance, HS (or GSA) is proposed to optimize the center and the width of each hidden unit in a trained RBFN. …”
Get full text
Get full text
Get full text
Thesis -
5
Furrow and crypt detection using modified ant colony optimization for iris recognition / Zaheera Zainal Abidin
Published 2016“…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
Get full text
Get full text
Thesis -
6
Furrow and crypt detection using Modified Ant Colony Optimization for iris recognition / Zaheera Zainal Abidin
Published 2016“…As a solution, to improve the accuracy performance, this research proposes a new approach called as Modified Ant Colony Optimization that uses ant colony algorithm which search for crypts and radial furrow. …”
Get full text
Get full text
Book Section -
7
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
Get full text
Get full text
Get full text
Thesis -
8
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
Get full text
Get full text
Get full text
Thesis -
9
Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer
Published 2023“…This algorithm named JAABC5ROC is the enhancement of Artificial Bee Colony (ABC) variant, JA-ABC5 by combining with Rate of Change (ROC)\. …”
Get full text
Get full text
Thesis -
10
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
12
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
13
-
14
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
15
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
17
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
19
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
20
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article
