Search Results - (( initial detection system algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- initial detection »
- system algorithm »
- method algorithm »
-
1
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…These methods were tested on NSL-KDD intrusiondetection datasets and the results indicate that the proposed approaches used in the system performed well in large dataset processing. …”
Get full text
Get full text
Thesis -
2
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. …”
Get full text
Get full text
Conference or Workshop Item -
3
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…For the second objective, the Analytic Hierarchy Process (AHP) was used to decide which stations can be used to monitor the railway system optimally. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. …”
Get full text
Get full text
Article -
5
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
6
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
Get full text
Get full text
Thesis -
7
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…Unlike traditional methods that usually start with detection and followed by denoising, the model initially leverages the powerful ability of deep CNN architecture to separate noise from noisy image, then adopts PSO to pinpoint the most optimized threshold values for detecting impulse noisy pixels. …”
Get full text
Get full text
Get full text
Thesis -
8
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…The early design of the augmented reality application exhibits potential for real-time data visualisation, providing insights into optimal detection distances and angles. This research lays the foundation for future investigations into integrating methods for stable augmented reality applications in cooling systems. …”
Get full text
Get full text
Thesis -
9
Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction
Published 2024“…The images were reconstructed using the OSEM (16 subsets, 3 iterations) and Q.Clear algorithms, both of which include Point Spread Function (PSF) modelling. …”
Get full text
Get full text
Monograph -
10
File integrity monitor scheduling based on file security level classification
Published 2011“…Integrity of operating system components must be carefully handled in order to optimize the system security. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Optimized Decision Forest for Website Phishing Detection
Published 2021“…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
12
A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah
Published 2012“…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
Get full text
Get full text
Thesis -
13
Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli
Published 2015“…Each experiment highlight the advantages and disadvantages of the experimental architecture.The disadvantages from each experiment prompts the design of dynamic parallel partitioning and allocating framework. The case study use for this experiment is Sobel edge detection algorithm. …”
Get full text
Get full text
Thesis -
14
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…To attain high cognitive interaction and safe human-machine system, there is a need to detect the user‘s movement intention. …”
Get full text
Get full text
Thesis -
15
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…A boost ensemble learning algorithm using Support Vector Machines (SVM) as initial classifiers and Artificial Neural Networks (ANN) as a final classifier is employed to learn the patterns of different skin lesion class features. …”
Get full text
Get full text
Get full text
Article -
16
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
Get full text
Get full text
Thesis -
17
2TSS: Two-tier semantic segmentation framework with enhancement for hotspot detection of solar photovoltaic thermal images
Published 2025“…Recently, intelligence-based hotspot detection has been widely used in solar photovoltaic (PV) image applications. …”
Get full text
Get full text
Get full text
Article -
18
Object tracing from synthetic fluid spray through instance segmentation
Published 2024“…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
Get full text
Get full text
Thesis -
19
Design and implementation of a deep learning based hand gesture recognition system for Rehabilitation Internet-Of-Things (RIOT) environments using MediaPipe
Published 2025“…Several limitations, including latency and distance sensitivity, are addressed in this system with edge computing alongside adaptive algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
Get full text
Get full text
Thesis
