Search Results - candidate ((((control algorithm) OR (selection algorithm))) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…In the proposed TVS, a modified candidate segment selection technique is initially employed to determine the candidate segments from the entire video. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Improving the efficiency of clustering algorithm for duplicates detection by Emran, Nurul Akmar, Abdul Rahim, Abdulrazzak Ali Mohamed, Kamal Baharin, Safiza Suhana, Othman, Zahriah, Salem, Awsan Thabet, Abd Aziz, Maslita, Md. Bohari, Nor Mas Aina, Abdullah, Noraswaliza

    Published 2023
    “…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network by Karimi, Abbas, Abedini, S. M., Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2013
    “…In other words, fuzzy logic is proposed based on three variables- energy, density and centrality-to introduce the best nodes to base station as cluster head candidate. Then, the number and place of cluster heads are determined in base station by using genetic algorithm based on chaotic. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network by Adam, A., Ibrahim, Z., Mokhtar, N., Shapiai, M.I., Mubin, M.

    Published 2016
    “…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
    Get full text
    Get full text
    Article
  12. 12

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Development Of Hierarchical Skin-Adaboost-Neural Network (H-Skann) For Multiface Detection In Video Surveillance System by Zakaria, Zulhadi

    Published 2017
    “…HSA is proposed to extend the searching of face candidates in selected segmentation area based on the hierarchical architecture strategy, in which each level of the hierarchy employs an integration of Adaboost and Neural Network Algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network by Asrul, Adam, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai, Marizan, Mubin

    Published 2016
    “…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy by Fadhil Mukhlif , Aswad Al-Obaidy

    Published 2020
    “…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Levy tunicate swarm algorithm for solving numerical and real-world optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…Therefore, we used the Levy distribution rather than the conventional uniform distribution in the candidate selection procedure to solve the TSA algorithm local optima problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE) by Tijani, Ismaila Bayo, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2015
    “…This thus requires a priori selection of weighting structures. Practical implications – The proposed MODE-infinity controller algorithm is expected to ease the design and deployment of the robust controller in autonomous helicopter application especially for practicing engineer with little experience in advance control parameters tuning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems by Yasear, Shaymah Akram

    Published 2020
    “…The algorithm includes (i) a population update strategy which improves the movement of hawks in the search space, (ii) a parameter adjusting strategy to control the transition between exploration and exploitation, and (iii) a population generating method in producing the initial candidate solutions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A Fuzzy Logic Positional-Based Controller For Sensorbased Robotic Motion Planning by Khaksar W., Yousefi M., Saharia K.S.M., Ismail F.B.

    Published 2023
    “…The proposed controller evaluates candidate positions of the robot and selects the most promising ones according to the output of a fuzzy logic controller. …”
    Article