Search Results - (( work detection method algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
-
1
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
2
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In this paper, GA path-planning approach is enhanced with feasible path detection mechanism based on traversability vectors method. …”
Get full text
Get full text
Get full text
Article -
3
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
4
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
Published 2023“…However, it is hard to determine the fuzzy parameter manually in a complex problem, and the process of generating the parameter is called fuzzy modelling. Therefore, an optimization method is needed to solve this issue, and one of the best methods to be applied is Butterfly Optimization Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
6
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
7
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
8
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Advanced chirped spectral modulation technique and particle swarm optimization algorithms for effective indoor air pollution detection and monitoring
Published 2025“…To address this challenge, optimization algorithms such as the Particle Swarm Optimization (PSO) algorithm have shown promise. …”
Article -
12
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation
Published 2019“…The very large number of test cases and time consumption for a test, it is becoming hard to perform exhaustive testing for any software fault detection. For this reason, combinatorial testing (CT) also known as t-way testing, is one of the well-known methods that are used for fault detections to many software systems. …”
Get full text
Get full text
Article -
14
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
15
AUTOMATED VEHICLE COUNTING AND CLASSIFICATION SYSTEM FOR TRAFFIC CENSUS
Published 2012“…The chosen algorithm for vehicle detection is called approximate median as it is more accurate compared to background subtraction method. …”
Get full text
Get full text
Final Year Project -
16
Automated threshold detection for object segmentation in colour image
Published 2016“…The procedure starts with selection of optimal RGB channel. Then H(•) algorithm is applied for automated threshold detection to convert the image frames into grayscale image. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
SINR improvement using Firefly Algorithm (FA) for Linear Constrained Minimum Variance (LCMV) beamforming technique
Published 2023Conference Paper -
18
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…In these experiments, it was demonstrated that the FLN optimization method achieved 0.9964 which is a higher accuracy than most of the existing paradigms for classifying network intrusion detection data.…”
Get full text
Get full text
Thesis -
20
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis
