Search Results - (( process detection system algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- process detection »
- system algorithm »
- method algorithm »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…However, it is hard to determine the fuzzy parameter manually in a complex problem, and the process of generating the parameter is called fuzzy modelling. Therefore, an optimization method is needed to solve this issue, and one of the best methods to be applied is Butterfly Optimization Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023Subjects:Conference Paper -
4
A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method
Published 2018“…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
Get full text
Get full text
Get full text
Article -
5
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
6
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
9
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…For the second objective, the Analytic Hierarchy Process (AHP) was used to decide which stations can be used to monitor the railway system optimally. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…With SSA optimization, the Sauvola method combined with SVM reaches an accuracy of 99.58%, surpassing other methods that use image processing and ANN classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
13
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…In addition, a method of utilizing Convolutional Neural Network (CNN) is used for the detection of vehicles from roadway camera outputs to apply video processing techniques and extract the desired information. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
15
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Model structure selection is one of the important steps in a system identification process. Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Overhead view based person counting using deep learning
Published 2022“…In conventional video surveillance systems, most of the person detection methods are based on frontal view, which may have lower accuracy stemming from the occlusion problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article -
18
AUTOMATED VEHICLE COUNTING AND CLASSIFICATION SYSTEM FOR TRAFFIC CENSUS
Published 2012“…Computer vision technology is used to achieve this objective. For the vehicle detection, background subtraction and approximate median algorithm are used. …”
Get full text
Get full text
Final Year Project -
19
Optical character recognition for Quranic image similarity matching
Published 2017“…Diacritic detections are performed using a region-based algorithm. …”
Get full text
Get full text
Get full text
Article -
20
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…These methods were tested on NSL-KDD intrusiondetection datasets and the results indicate that the proposed approaches used in the system performed well in large dataset processing. …”
Get full text
Get full text
Thesis
