Search Results - (( initial detection system algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…These methods were tested on NSL-KDD intrusiondetection datasets and the results indicate that the proposed approaches used in the system performed well in large dataset processing. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…For the second objective, the Analytic Hierarchy Process (AHP) was used to decide which stations can be used to monitor the railway system optimally. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. …”
    Get full text
    Get full text
    Article
  5. 5

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…Unlike traditional methods that usually start with detection and followed by denoising, the model initially leverages the powerful ability of deep CNN architecture to separate noise from noisy image, then adopts PSO to pinpoint the most optimized threshold values for detecting impulse noisy pixels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…The early design of the augmented reality application exhibits potential for real-time data visualisation, providing insights into optimal detection distances and angles. This research lays the foundation for future investigations into integrating methods for stable augmented reality applications in cooling systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction by Hui, Ng Suk

    Published 2024
    “…The images were reconstructed using the OSEM (16 subsets, 3 iterations) and Q.Clear algorithms, both of which include Point Spread Function (PSF) modelling. …”
    Get full text
    Get full text
    Monograph
  10. 10

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…Integrity of operating system components must be carefully handled in order to optimize the system security. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Optimized Decision Forest for Website Phishing Detection by Balogun, A.O., Mojeed, H.A., Adewole, K.S., Akintola, A.G., Salihu, S.A., Bajeh, A.O., Jimoh, R.G.

    Published 2021
    “…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
    Get full text
    Get full text
    Article
  12. 12

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…Each experiment highlight the advantages and disadvantages of the experimental architecture.The disadvantages from each experiment prompts the design of dynamic parallel partitioning and allocating framework. The case study use for this experiment is Sobel edge detection algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…To attain high cognitive interaction and safe human-machine system, there is a need to detect the user‘s movement intention. …”
    Get full text
    Get full text
    Thesis
  15. 15

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…A boost ensemble learning algorithm using Support Vector Machines (SVM) as initial classifiers and Artificial Neural Networks (ANN) as a final classifier is employed to learn the patterns of different skin lesion class features. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Object tracing from synthetic fluid spray through instance segmentation by Md Refat Khan, Pathan

    Published 2024
    “…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis