Search Results - (( using optimization based algorithm ) OR ( basic detection a algorithm ))
Search alternatives:
- basic detection »
- detection a »
- a algorithm »
-
1
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
2
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…However, the internal power parameters (weight and basis) of ELM are initialized at random, causing the algorithm to be unstable. The Particle swarm optimization (PSO) is a well-known meta-heuristic which is used in this research to optimize the ELM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Facial emotion detection using Guided Particle Swarm Optimization (GPSO)
Published 2009Get full text
Working Paper -
4
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
5
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
6
Classification of herbs plant diseases via hierarchical dynamic artificial neural network
Published 2010“…These visual symptoms continuously change their color, shape and size as the disease progresses. Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
Get full text
Get full text
Article -
7
-
8
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Multiplier is a basic device in many digital systems such as signal processor, calculator and micro controller. …”
Get full text
Get full text
Conference or Workshop Item -
9
Classification of herbs plant diseases via hierachical dynamic artificial neural network after image removal using kernel regression framework
Published 2011“…These visual symptoms continuously change their color, shape and size as the disease progresses. Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
Get full text
Get full text
Article -
10
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
11
Abnormal event detection in video surveillance / Lim Mei Kuan
Published 2014“…These low-level descriptions are then integrated using a basic set of rule-packages, to discriminate the different events. …”
Get full text
Get full text
Thesis -
12
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…Power system state estimation is the heart of data processing activities of modern electric utility energy control center. By using real time measurements and historical data base, power system state estimator detects errors in measurements and the data base; and calculates an optimal estimate of the system state vector of the bus voltage magnitudes and angles. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…For accurate simulation of manufacturing systems and processes in virtual environment, physical interaction with the objects in the scene are triggered by collision detection. This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
14
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005Get full text
Get full text
Final Year Project -
15
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
16
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
17
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
18
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
19
Optimization of cost-based hybrid flowshop scheduling using teaching-learning-based optimization algorithm
Published 2024“…This paper investigates the optimization of a CHFS problem using the Teaching Learning-Based Optimization (TLBO) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
