Search Results - ((detection algorithm) OR (((selection algorithm) OR (control algorithm))))
Search alternatives:
- selection »
-
1
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
2
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
Published 2014“…number of algorithms have been recently proposed for automatic intruder detection from CCTV images. …”
Get full text
Get full text
Get full text
Article -
3
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…To achieve such goal, this research modifies and improves the Reduction with Selective Redundancy (RSR) algorithm. In the modify algorithm, test cases would be selected according to the branch coverage if they covered different branch combination. …”
Get full text
Get full text
Thesis -
4
Fault diagnostic algorithm for precut fractionation column
Published 2004“…This paper presents an algorithm which can be used to detect and diagnose unexpected process faults in the operation of fatty acid precut fractionation column. …”
Get full text
Get full text
Conference or Workshop Item -
5
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…In this paper an algorithm is developed for automatic spray control system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…By the combination of morphological approach to select the region of interest, the tracking algorithm delivers promising results as the tracking algorithm achieved 90% of ambulance detection at road intersections.…”
Get full text
Get full text
Thesis -
7
Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System
Published 2021“…The proposed method has three steps: preprocessing, feature selection and classification. Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
Get full text
Get full text
Get full text
Article -
8
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Results showed that the developed FDD algorithm successfully detect and diagnosed the pre-designed faults. …”
Get full text
Get full text
Monograph -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
11
Automated surveillance in distributed, wireless visual networks: a comparative study
Published 2013“…A number of algorithms have been recently proposed for automatic intruder detection from CCTV images. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors
Published 2025“…Optimization algorithms are successfully applied in the feature selection task in many systems. …”
Get full text
Get full text
Get full text
Article -
13
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…While further research requires a special algorithm to improve malware attack detection, in addition to KNN, SVM and Neural Network. …”
Get full text
Get full text
Get full text
Article -
14
Improved Ozone Level Detection through Feature Selection with Modified Whale Optimization Algorithm
Published 2024“…This study presents a new approach for ozone level detection through feature selection by the modified Whale Optimization Algorithm (mWOA). …”
Get full text
Get full text
Get full text
Article -
15
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
16
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
Get full text
Get full text
Get full text
Thesis -
17
Improved Ozone Level Detection through Feature Selection with Modified Whale Optimization Algorithm
Published 2024“…This study presents a new approach for ozone level detection through feature selection by the modified Whale Optimization Algorithm (mWOA). …”
Get full text
Get full text
Get full text
Article -
18
New CFAR algorithm and circuit development for radar receiver
Published 2020“…Therefore, the MSS-CA-CFAR is chosen to implement by practical digital circuit and there is another important feature in the MSS-CFAR algorithm that is parallel processing since the spike selection process is done at the same time with summing of samples process that makes this algorithm much less in processing time from any other algorithm using the same environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
SMART: a subspace based malicious peers detection algorithm for P2P systems
Published 2013“…Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. …”
Get full text
Get full text
Get full text
Article -
20
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022Subjects: “…Algorithms…”
Get full text
Get full text
Thesis
