Search Results - adoption using different ((evolution algorithm) OR (detection algorithm))*
Search alternatives:
- evolution algorithm »
- adoption using »
-
1
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
2
SVM for network anomaly detection using ACO feature subset
Published 2016“…KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. …”
Get full text
Get full text
Conference or Workshop Item -
3
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
4
Weighting method for modal parameter based damage detection algorithms
Published 2011“…When researchers use bending modes for the purpose of damage detection, a number of available modes are adopted, each of which return a value indicating the severity of damage. …”
Get full text
Get full text
Article -
5
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
6
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
7
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
8
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…Research works published from the year 2018 to 2022 are identified in terms of problem representation and evolutionary strategies adopted. The mechanisms and strategies used in evolutionary algorithms to address different types of combinatorial optimization problems are discovered. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
10
A comparative study for parameter selection in online auctions
Published 2009“…In this work, three different models of genetic algorithms are considered. …”
Get full text
Get full text
Get full text
Thesis -
11
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Multisensor Data Fusion Algorithm for Contactless 3D Position Measurement for Post-Stroke Hand Rehabilitation
Published 2018“…Evaluation of potential commercial-grade stereo-vision systems have been performed and fingertip detection algorithms have been proposed and evaluated. …”
Get full text
Get full text
Monograph -
15
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…In a semiconductor industry, wafer defect detection has becoming ubiquitous. Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…The performance of the abovementioned classifiers using different features values was evaluated. The experimental results indicate that the detection accuracy improves by approximately 1.55% when implemented using the PSO-based selected features than that of using GA-based selected features. …”
Get full text
Get full text
Article -
18
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
19
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…The parameters of the Jang algorithm and TransGuide algorithm were sensitive for different days. …”
Get full text
Get full text
Get full text
Thesis
