Search Results - (( usage detection using algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- method algorithm »
- usage detection »
- using algorithm »
-
1
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
2
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
Get full text
Get full text
Get full text
Article -
3
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The proposed project will extract the features of system calls, network packets, CPU usage and battery usage of the application. The proposed project achieves overall accuracy level of 96.67% using Sequential Minimal Optimization classifier.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
4
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
Get full text
Get full text
Thesis -
5
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…These techniques have been used to optimize control points and weights in the description of spline functions used. …”
Get full text
Get full text
Thesis -
6
-
7
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…This system has many usages in security system and also can be used for authentication, person verification, video surveillance, preventing crime, and security activities. …”
Get full text
Get full text
Get full text
Thesis -
8
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
9
Leaf condition analysis using convolutional neural network and vision transformer
Published 2024“…Through the use of a hybrid deep learning model that combines vision transformer and convolutional neural networks for classification, the algorithm can be optimized. …”
Get full text
Get full text
Get full text
Article -
10
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
11
Video Tracking System Using Midrange Exploration Exploitation Searching-Particle Swarm Optimization (MEESPSO) in handling occlusion and similar appearance due to crowded environmen...
Published 2021“…In addition, the usage of conventional method still brings the limitation in term of the accuracy and precision of the detected object. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Automated underwater vision system for detection and classification of marine life using CNN YOLO-based model / Mohamed Syazwan Asyraf Rosli
Published 2022“…Recently, the integration of computer vision and machine learning has given solutions to improve the underwater detection system by using intelligent classifier algorithm in real-time computer vision to detect underwater animals with challenging environments. …”
Get full text
Get full text
Thesis -
13
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The first layer is used to detect up to superfamily and family in SCOP hierarchy, by using optimized binary SVM classification rules directly to ROC-Area. …”
Get full text
Get full text
Monograph -
14
Inchworm robot grippers in clothes manipulation - Optimizing the tracing algorithm
Published 2023Conference paper -
15
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
Get full text
Get full text
Thesis -
16
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…The fault detection algorithm identifies the time and location of each fault. …”
Get full text
Get full text
Thesis -
17
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
19
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
20
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
Get full text
Get full text
Thesis
