Search Results - ((detection algorithm) OR (((optimization algorithm) OR (connection algorithm))))
Search alternatives:
-
1
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
2
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
Get full text
Get full text
Get full text
Article -
3
Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks
Published 2010“…Maintaining inter-actor connectivity becomes extremely crucial in such situations where actors have to quickly plan optimal coordinated response to detected events. …”
Get full text
Get full text
Article -
4
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…The Ant Colony Optimization (ACO) Algorithm has been adapted for the protein functional module detection by modeling the problem as an optimization problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
6
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Partitioning detection and connectivity restoration algorithm for WSAN
Published 2010“…Maintaining inter-actor connectivity becomes extremely crucial in such situations where actors have to quickly plan optimal coordinated response to detected events. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…HBA as metahueristic algorithm is used to optimize the network training process of ANN to improve their performances. …”
Get full text
Get full text
Get full text
Article -
9
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…This algorithm maintains the local optimal radius of micro-clusters rather than a global and constant radius. …”
Get full text
Get full text
Thesis -
10
A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network
Published 2018“…The Ant Colony Optimization (ACO) Algorithm has been adapted for the protein functional module detection by modeling the problem as an optimization problem. …”
Get full text
Get full text
Get full text
Article -
11
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
12
Volunteer-instigated Connectivity Restoration algorithm for Wireless Sensor and Actor Networks
Published 2010“…In these networks, maintaining inter-actor connectivity is of a paramount concern in order to plan an optimal coordinated response to a detected event. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
Get full text
Get full text
Thesis -
14
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…In future work, the algorithm can still be optimized to offer better performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Damaging the full-scale tower is not practical; thus, two different parts of the tower segments and their connections (1-2 and 2-3) are considered and tested experimentally with and without damage to validate the capability of the developed hybrid algorithm to detect damage. …”
Get full text
Get full text
Thesis -
16
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…Two metaheuristic algorithms i.e., Harmony Search (HS) and Gravitational Search Algorithm (GSA), are selected to integrate separately with a Radial Basis Function Network with Dynamic Decay Adjustment (RBFN-DDA) to perform condition monitoring in industrial processes. …”
Get full text
Get full text
Get full text
Thesis -
17
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…This also proved to be the most complicated area for research, which was to detect the maximal total of active nodes or sleep, specifically the node scheduling part, its business with the WSN being to determine the optimal coverage area at which exist the most number of active nodes that manage connectivity and coverage. …”
Article -
18
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…Meanwhile, Spark Streaming effectively provides illustrious abstraction known as DStream, signifying an uninterrupted stream of data whereas Spark MLlib leverages algorithmic optimizations of MLlib and applies them in the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
19
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
20
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article
