Search Results - (( parameter optimization system algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- parameter optimization »
- optimization system »
- parameter detection »
- system algorithm »
- method algorithm »
-
1
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
2
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
3
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
5
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The process of selecting the least number of features without any effect on the result accuracy in FSS was considered a multi-objective optimization problem. The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
6
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…Therefore, an optimization method is needed to solve this issue, and one of the best methods to be applied is Butterfly Optimization Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The optimization method derives from the metaheuristic algorithm. …”
Get full text
Get full text
Article -
8
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
Get full text
Get full text
Thesis -
9
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
10
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…By integrating with the HS (or GSA) algorithm, the proposed metaheuristic neural networks (i.e., RBFN-DDA-HS and RBFN-DDA-GSA) can optimize the RBFN-DDA parameters and improve classification performances from the original RBFN-DDA up to 28.69% in two benchmarks datasets, which are numerical records from a bearing and steel plate system and a condition-monitoring system in a power plant (i.e., the circulating water (CW) system). …”
Get full text
Get full text
Get full text
Thesis -
11
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. …”
Get full text
Get full text
Get full text
Article -
12
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
Get full text
Get full text
Thesis -
13
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. …”
Get full text
Get full text
Conference or Workshop Item -
14
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Therefore, the aim of the study is to identify a fast, simple, and reliable method of FD on GCPV system in Malaysia. The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
16
Power System State Estimation In Large-Scale Networks
Published 2010“…Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
17
Kinetic parameters estimation of the Escherichia coli (E. coli) model by Garra Rufa-inspired Optimization Algorithm (GRO)
Published 2024“…So, Garra Rufa-inspired Optimization (GRO) Algorithm is applied to the primary metabolic network of E. coli as a model to estimate small-scale kinetic parameters and increase the kinetic accuracy. …”
Get full text
Get full text
Get full text
Article -
18
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Article -
20
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project
