Search Results - (( using optimization method algorithm ) OR ( binary classification system algorithm ))
Search alternatives:
- binary classification »
- classification system »
- method algorithm »
- system algorithm »
-
1
Improving amphetamine-type stimulants drug classification using chaotic-based time-varying binary whale optimization algorithm
Published 2022“…A new chaotic time-varying binary whale optimization algorithm (CBWOATV) is introduced in this paper to optimize the feature selection process in Amphetamine-type Stimulants (ATS) and non-ATS drugs classification. …”
Get full text
Get full text
Get full text
Article -
2
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
5
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
6
Hybrid binary whale with harris hawks for feature selection
Published 2022“…As a result, feature selection is offered as a method for eliminating unwanted characteristics. This study introduces the BWOAHHO memetic technique, which combines the binary hybrid Whale Optimization Algorithm (WOA) with Harris Hawks Optimization (HHO). …”
Get full text
Get full text
Article -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
8
Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq
Published 2024“…A Convolutional Neural Network (CNN) model was created from scratch for this study. Combining Local Binary Patterns (LBP) based texture features and deep learning features resulted in the creation of the fused features vector which was then optimized using Binary Dragonfly Algorithm (BDA) and Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Thesis -
9
Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems
Published 2024“…Hence, optimization algorithms, consisting of exact and heuristic methods, are crucial for a myriad of real-world applications. …”
Get full text
Get full text
Thesis -
10
-
11
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…Using the NSL-KDD dataset for evaluation, the proposed method demonstrates superior performance compared to conventional algorithms and related deep learning techniques, achieving higher precision, recall, F1 scores and overall accuracy in both binary and multi-class classification tasks. …”
Get full text
Get full text
Get full text
Thesis -
12
Information Theoretic-based Feature Selection for Machine Learning
Published 2018“…Thus, this thesis precisely developed and evaluated IFS_BACS (Binary Ant Colony System) hybrid method. Further experiments were carried out using the natural domain datasets and comparison were made between IFS and hybrid IFS_BACS methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
14
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…The neural network methods use a number of heuristics to find appropriate parametric values. …”
Get full text
Get full text
Monograph -
15
Enhanced Multi-Objective Grey Wolf Optimizer with Lévy Flight and Mutation Operators for Feature Selection
Published 2023“…While it is a multi-objective problem, current methods tend to treat feature selection as a single-objective optimization task. …”
Get full text
Get full text
Article -
16
Task-state EEG signal classification for spatial cognitive evaluation based on multiscale high-density convolutional neural network
Published 2022“…Besides, the multi-dimensional conditional mutual information method was used to extract the frequency band features of the EEG data. …”
Get full text
Get full text
Article -
17
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Due to the current methods in feature extraction are still improving, this project proposed a new feature extraction method to increase the performance of iris classification. In this project, a classification system is proposed with the one-dimensional local binary pattern algorithm (1D-LBP) with the K-Nearest Neighbour (K-NN) classifier and the system is developed by using a Raspberry Pi 3.There are eight different subjects used to classify in this classification system and each subject consists of seven samples of normalized iris image as input to the system. …”
Get full text
Get full text
Monograph -
18
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018“…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Feature Selection using Binary Simulated Kalman Filter for Peak Classification of EEG Signals
Published 2018Get full text
Get full text
Conference or Workshop Item
