Search Results - (( using using optimization algorithm ) OR ( basic detection using algorithm ))
Search alternatives:
-
1
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…In this paper, the particle swan optimization algorithm (PSO) was used to obtain an optimal set of initial parameters for Reduce Kernel FLN (RK-FLN), thus, creating an optimal RKFLN classifier named PSO-RKELM. …”
Get full text
Get full text
Conference or Workshop Item -
2
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
3
Real-time system for facial emotion detection using GPSO algorithm
Published 2012Get full text
Working Paper -
4
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…However, the internal power parameters (weight and basis) of ELM are initialized at random, causing the algorithm to be unstable. The Particle swarm optimization (PSO) is a well-known meta-heuristic which is used in this research to optimize the ELM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Facial emotion detection using Guided Particle Swarm Optimization (GPSO)
Published 2009Get full text
Working Paper -
6
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
9
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis -
10
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
11
Designing an integrated AIOT system for tracking class attendance
Published 2024“…For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Classification of herbs plant diseases via hierarchical dynamic artificial neural network
Published 2010“…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
Get full text
Get full text
Article -
13
Classification of herbs plant diseases via hierachical dynamic artificial neural network after image removal using kernel regression framework
Published 2011“…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
Get full text
Get full text
Article -
14
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
Article -
15
-
16
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Power System State Estimation In Large-Scale Networks
Published 2010“…Hence. SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
Get full text
Get full text
Thesis -
18
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
Get full text
Get full text
Conference or Workshop Item -
19
Abnormal event detection in video surveillance / Lim Mei Kuan
Published 2014“…These low-level descriptions are then integrated using a basic set of rule-packages, to discriminate the different events. …”
Get full text
Get full text
Thesis -
20
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
