Search Results - (( peer detection method algorithm ) OR ( changes optimization method algorithm ))
Search alternatives:
- changes optimization »
- method algorithm »
- peer detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
2
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…In the first group, the conventional techniques are combined with other techniques and the second group is based on the optimization methods. One of the main challenges of MPPT techniques under PSCs is ability of the algorithms to find the GMPP faster with minimal oscillation in power. …”
Get full text
Get full text
Thesis -
4
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
Get full text
Get full text
Get full text
Thesis -
5
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
Get full text
Get full text
Get full text
Article -
6
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…As such, its training can reach stability in a shorter time compared to the gradient-descent based methods. To achieve optimal RBFN-DDA performance, HS (or GSA) is proposed to optimize the center and the width of each hidden unit in a trained RBFN. …”
Get full text
Get full text
Get full text
Thesis -
7
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…The standard DE algorithm is known as a fixed length optimizer, while our problem demands the need for methods that aren’t tolerated to a fixed individual size, and that was made by altering the mutation and crossover strategies as well as the selection operation. …”
Get full text
Get full text
Thesis -
8
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
9
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
10
Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad
Published 2018“…In order to realize the first aspect, a combination of particle swarm optimization (PSO) algorithm and firefly algorithm (FA) can be used to maximize the amount of remaining load and the voltage stability index (SI) in the distribution network. …”
Get full text
Get full text
Get full text
Thesis -
11
A buffer-based online clustering for evolving data stream
Published 2019“…This algorithm recursively updates the micro-cluster radius to its local optimal. …”
Get full text
Get full text
Get full text
Article -
12
Extraction and reconstruction of retinal vasculature
Published 2007“…The reconstruction technique reduces the required number of seeds to near optimal for the region growing process. It also overcomes poor performance of current seed-based methods, especially with low and inconsistent contrast images as normally seen in vasculature regions of fundus images. …”
Get full text
Get full text
Get full text
Citation Index Journal -
13
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Then, these two features were fused into a set of hybrid spectral-entropy attributes ( SEA). Consequently, optimization algorithms including binary gravitation search algorithm (BGSA) and binary particle swarm optimization (BPSO), were employed to identify the optimal channels for gender classification. …”
Get full text
Get full text
Article -
14
Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model
Published 2020“…A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. The approach is based on optimization of selected test case from test suite T. …”
Get full text
Get full text
Get full text
Article -
17
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
Get full text
Get full text
Get full text
Article -
18
Fault-tolerant power extraction strategy for photovoltaic energy systems
Published 2018“…The objective of this study is to propose a fault-tolerant control (FTC) strategy to detect the presence of abnormal operating conditions and reconfigure the MPPT procedure to search for the new suboptimal operating point. The FDI method is based on monitoring the PV panel generated power for the presence of abrupt changes; the MPPT reconfiguration is based on a combination between Incremental Conductance (IncCond) Algorithm and an Improved Current-based Particle Swarm Optimization (ICPSO) tracking technique. …”
Get full text
Get full text
Article -
19
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…Despite progress in deep learning and optimization algorithms, traffic light detection still faces persistent challenges under varying conditions such as illumination changes, occlusions, and visual clutter. …”
Get full text
Get full text
Get full text
Article -
20
Assessment of landsat 7 scan line corrector-off data gap-filling methods for seagrass distribution mapping
Published 2015“…Statistical measures for the recovered images showed that GNSPI can predict data gaps over the seagrass, non-seagrass/water body, and mudflat site classes with greater accuracy than the other two methods. For optimal performance of the GNSPI algorithm, cloud and shadow in the primary and auxiliary images had to be removed by cloud removal methods prior to filling data gaps. …”
Get full text
Get full text
Article
