Search Results - (( java adaptation optimization algorithm ) OR ( knowledge optimization detection algorithm ))
Search alternatives:
- adaptation optimization »
- knowledge optimization »
- optimization detection »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
-
3
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
5
-
6
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…This research aimed to identify the best features that lead to better predictive accuracy of dengue outbreaks using three different feature selection algorithms; particle swarm optimization (PSO), genetic algorithm (GA) and rank search (RS). …”
Get full text
Get full text
Get full text
Article -
7
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…The optimization of pilot symbols values and their placement as a disjoint optimization problem may not necessarily exhibit low coherence compressed CE. …”
Get full text
Get full text
Thesis -
8
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…This algorithm maintains the local optimal radius of micro-clusters rather than a global and constant radius. …”
Get full text
Get full text
Thesis -
9
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
10
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
11
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
Get full text
Get full text
Thesis -
12
Early detection of dengue disease using extreme learning machine
Published 2018Get full text
Get full text
Article -
13
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015Get full text
Get full text
Conference or Workshop Item -
14
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
15
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
16
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
18
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
Get full text
Get full text
Get full text
Thesis -
19
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
20
