Search Results - (( using based method algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- parameter detection »
- method algorithm »
- using based »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
3
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
4
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
6
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
7
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
8
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…Three measures of similarity based on the circular distance were used to obtain a cluster tree using the agglomerative hierarchical methods. …”
Get full text
Get full text
Get full text
Article -
10
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
11
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…Three measures of similarity based on the circular distance were used to obtain a cluster tree using the agglomerative hierarchical methods. …”
Get full text
Get full text
Get full text
Article -
12
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…Three measures of similarity based on the circular distance were used to obtain a cluster tree using the agglomerative hierarchical methods. …”
Get full text
Get full text
Get full text
Article -
13
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
14
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
15
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
Get full text
Get full text
Article -
16
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
17
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
18
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
Get full text
Get full text
Get full text
Article -
19
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis
