Search Results - candidate ((((electron algorithm) OR (function algorithm))) OR (detection algorithm))
Search alternatives:
-
1
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
2
An effective source number enumeration approach based on SEMD
Published 2022“…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
Get full text
Get full text
Article -
3
White Hole-Black Hole Algorithm
Published 2016“…The white hole-black hole algorithm (WH-BH) starts with an initial population of candidate solutions to an optimization problem and an objective function that is calculated for them. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Human odour detection approach using machine learning
Published 2019“…In addition, 10 gasses are detected with zero values for both the entropy and the chi- square test, and these gasses are the strongest candidates to detect and classify odours. …”
Get full text
Get full text
Get full text
Thesis -
5
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
Get full text
Get full text
Research Reports -
8
Comparison and analysis study of sha-3 finallists
Published 2012“…Therefore, this paper addresses a comparative study of round 2 finalist SHA-3 candidates in; design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Conference or Workshop Item -
10
Levy tunicate swarm algorithm for solving numerical and real-world optimization problems
Published 2022“…We took advantage of Levy flight, which solved the local optima problem and improved traditional TSA efficiency. The proposed LTSA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional TSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
Get full text
Get full text
Conference or Workshop Item -
12
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…We took advantage of the Levy flight, which solved the local optima problem and improved traditional SMA efficiency. The proposed LSMA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional SMA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A fast discrete gravitational search algorithm
Published 2012“…Unimodal test functions, such as De Jong's function, Scwefel's function and Rosenbrock's valley are used to evaluate the performance of the proposed FDGSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
15
Hash function of finalist SHA-3: analysis study
Published 2013“…Thus, for this reason the paper addresses the comparative and analysis study of the finalist SHA-3 candidates in: complexity of security, design and structure, as well as performance and cost, to measure the robustness of the algorithms in this area, through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). …”
Get full text
Get full text
Get full text
Article -
16
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
Get full text
Get full text
Book Section -
17
Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network
Published 2016“…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
Get full text
Get full text
Article -
18
PMT: opposition-based learning technique for enhancing meta-heuristic performance
Published 2019“…To evaluate the PMT's performance and adaptability, the PMT has been applied to four contemporary meta-heuristic algorithms, differential evolution (DE), particle swarm optimization (PSO), simulated annealing (SA), and whale optimization algorithm (WOA), to solve 15 well-known benchmark functions. …”
Get full text
Get full text
Get full text
Article -
19
Normative Fish Swarm Algorithm For Global Optimization With Applications
Published 2019“…In addition, the technique of modified global crossover is incorporated to strengthen the relationship between the candidate solutions. The performance of the NFSA has been tested on ten benchmark functions. …”
Get full text
Get full text
Thesis -
20
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Moreover, for the proposed SBD algorithm, a comparative study is performed with state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Article
