Search Results - (( initial detection modified algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- detection modified »
- initial detection »
- method algorithm »
-
1
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
2
Robust techniques for linear regression with multicollinearity and outliers
Published 2016“…A new proposed method which is called the modified generalized DFFITS (MGDFF) is developed in this regard, whereby the suspected HLPs in the initial subset are identified using our proposed IDRGP diagnostic method. …”
Get full text
Get full text
Thesis -
3
File integrity monitor scheduling based on file security level classification
Published 2011“…File integrity monitoring tools are widely used to detect any malicious modification to these critical files. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…Obviously, selecting four muscles to attain a full joint moment and motion is not sufficient, therefore we introduced the net joint moment obtained from the inverse dynamics to optimize the predicted joint moment. Initial estimate of the model is obtained from literature review while the Levenderg-Marquardt (LM) method is applied to solve the nonlinear least squares optimization problem. …”
Get full text
Get full text
Thesis -
5
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. …”
Get full text
Get full text
Article -
7
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
8
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In the proposed TVS, a modified candidate segment selection technique is initially employed to determine the candidate segments from the entire video. …”
Get full text
Get full text
Get full text
Thesis -
9
A modified watershed segmentation algorithm for automated lung cancer lesion detection in CT scan images / Nur Najihah Sofia Mohd Marzuki
Published 2024“…The performance of the segmentation process in conventional and modified watershed segmentation technique for detecting lung lesion, which produce average F-Score is 97.80% and 99.09%, respectively. …”
Get full text
Get full text
Thesis -
10
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
11
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
12
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Detection And Segmentation Of Mass Region In Mammogram Image
Published 2014“…Initially, the Mean Median Intersection Point (MMIP) algorithm is proposed to obtain a point in the intensity histogram to be set as threshold value to segment the breast region and distinguish it from the background in the mammogram image. …”
Get full text
Get full text
Thesis -
14
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
15
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
Published 2018“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Article -
16
Modified sequential fences for identifying univariate outliers
Published 2016“…Moreover, we proposed a new method with modified algorithm and methodology namely bootstrap sequential fences. …”
Get full text
Get full text
Thesis -
17
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
18
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
19
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. The proposed method shown an outperformed the existing classification method. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item
