Search Results - (( using optimization based algorithm ) OR ( basic detection based algorithm ))
Search alternatives:
- basic detection »
- detection based »
-
1
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
2
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
4
Facial emotion detection using Guided Particle Swarm Optimization (GPSO)
Published 2009Get full text
Working Paper -
5
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…These schemes follow a uniform framework,which is based on the detection of feature points which are commonly invariant to Rotation,Scaling and Translation (RST),therefore they naturally accommodate the framework of geometrically robust image watermarking. …”
Get full text
Get full text
Thesis -
6
-
7
Classification of herbs plant diseases via hierarchical dynamic artificial neural network
Published 2010“…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
Get full text
Get full text
Article -
8
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
Get full text
Get full text
Conference or Workshop Item -
9
Classification of herbs plant diseases via hierachical dynamic artificial neural network after image removal using kernel regression framework
Published 2011“…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
Get full text
Get full text
Article -
10
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
11
Abnormal event detection in video surveillance / Lim Mei Kuan
Published 2014“…These low-level descriptions are then integrated using a basic set of rule-packages, to discriminate the different events. …”
Get full text
Get full text
Thesis -
12
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…Power system state estimation is the heart of data processing activities of modern electric utility energy control center. By using real time measurements and historical data base, power system state estimator detects errors in measurements and the data base; and calculates an optimal estimate of the system state vector of the bus voltage magnitudes and angles. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Shot boundary detection based on orthogonal polynomial
Published 2019“…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. …”
Get full text
Get full text
Get full text
Article -
16
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
Get full text
Get full text
Thesis -
17
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
18
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Monograph -
19
Integrated artificial intelligence-based classification approach for prediction of acute coronary syndrome
Published 2014“…In the development of the “hybrid AI-based” classification models, the proposed model (K1-K2- NN), was basically introduced through combining AI approaches of modified K-NN, genetic algorithm (GA), Fisher’s discriminant ratio (FDR) and class separability criteria (CSC). …”
Get full text
Get full text
Get full text
Thesis -
20
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article
