Search Results - adoption _ differences ((optimisation algorithm) OR (detection algorithm))
Search alternatives:
- optimisation algorithm »
-
1
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…Grid search method was adopted to optimise the hyperparameters of the investigated base models. …”
Get full text
Get full text
Get full text
Article -
2
Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation
Published 2019“…In order to explore the solution search space of a combinatorial optimisation problem, an approximation algorithm performs perturbations on the existing solutions by adopting a single or multiple perturbative Low-Level Heuristic(s) (LLHs). …”
Get full text
Get full text
Thesis -
3
Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation
Published 2023“…The passive congregation theory of natural being's social behaviour is adopted to updated the standard PSO algorithm and used to develop and optimise a reservoir release policy for monthly basis. …”
Article -
4
Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub...
Published 2014“…Three simulation works are carried out using three different algorithms so as to refine the performance of the controller. …”
Get full text
Get full text
Monograph -
5
Hybrid genetic algorithm for uncapacitated university examination timetabling problem
Published 2015“…The main components of the genetic operators in a Genetic Algorithm (GA) will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). …”
Get full text
Get full text
Thesis -
6
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
7
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
9
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
10
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
Get full text
Get full text
Thesis -
17
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
Multisensor Data Fusion Algorithm for Contactless 3D Position Measurement for Post-Stroke Hand Rehabilitation
Published 2018“…Evaluation of potential commercial-grade stereo-vision systems have been performed and fingertip detection algorithms have been proposed and evaluated. …”
Get full text
Get full text
Monograph -
20
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper
