Search Results - (( using optimization methods algorithm ) OR ( basic detection _ algorithm ))
Search alternatives:
- optimization methods »
- methods algorithm »
- basic detection »
-
1
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. …”
Get full text
Get full text
Conference or Workshop Item -
2
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
3
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
4
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis -
5
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
6
-
7
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
8
Designing an integrated AIOT system for tracking class attendance
Published 2024“…For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…The application of orthogonal decomposition method using Householder transformation (refer to section 3.3) is used to solve the least-squares problem in power system state estimation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
13
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
14
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item -
15
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article -
16
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
Get full text
Get full text
Thesis -
17
Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis -
19
Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis -
20
Optimization Of Bar Linkage By Using Genetic Algorithms
Published 2005“…This thesis presents the method of using simple Genetic Algorithms (GAs) in optimizing the size of bar linkage with discrete design variables and continues design variables. …”
Get full text
Get full text
Monograph
