Search Results - (( parallel optimization path algorithm ) OR ( features detection based algorithm ))
Search alternatives:
- parallel optimization »
- features detection »
- optimization path »
- detection based »
- path algorithm »
-
1
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
Get full text
Get full text
Article -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
-
4
Evaluation of feature selection algorithm for android malware detection
Published 2018“…The Android features were filtered before detection process using TF-IDF algorithm. …”
Get full text
Article -
5
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The proposed algorithm considered features based on its level of importance where weight given based on number of features involved in the sample. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
7
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
9
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Using GSA, the parameter estimation of the classifier and the peak feature selection can be done simultaneously. Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Feature-based face recognition system using utilized artificial neural network
Published 2010“…The main contributions of this project are the automatic algorithms for mouth detection, facial features cropping and face classification. …”
Get full text
Thesis -
11
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
12
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
Get full text
Get full text
Thesis -
13
-
14
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
Get full text
Get full text
Thesis -
15
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
16
Shot boundary detection based on orthogonal polynomial
Published 2019“…The Features are derived from orthogonal transform domain (moments) to detect the hard transitions in video sequences. …”
Get full text
Get full text
Get full text
Article -
17
An algorithm for determination of rank and degree of contribution of sMRI volumetric features in depression detection
Published 2013“…The algorithm is based on the frequencies of each feature contribution toward the desired accuracy limit. …”
Get full text
Get full text
Get full text
Proceeding -
18
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
19
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017Get full text
Get full text
Conference or Workshop Item -
20
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…The optimized DBN algorithm, known as the HW-DBN algorithm, integrated through feature learning based on a Gaussian–Bernoulli Restricted Boltzmann Machine as well as classification task through a weight neuron network. …”
Get full text
Get full text
Get full text
Get full text
Thesis
