Search Results - candidate ((((encryption algorithm) OR (evolutionary algorithm))) OR (detection algorithm))
Search alternatives:
- evolutionary »
-
1
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
2
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
Get full text
Get full text
Thesis -
3
-
4
Defining fitness function for search based assessment of grammar reachability
Published 2018“…The reformulation efforts could be extended by reformulating such problems as Search Based CFG reachability problems, addressable using search algorithms, such as Evolutionary Programming (EP). However, this calls for the need of fitness function that can assess reachability attained by candidates during search process. …”
Get full text
Get full text
Get full text
Article -
5
3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain
Published 2016“…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
7
A competitive co-evolutionary approach for the nurse scheduling problem
Published 2026“…This study proposes a competitive co-evolutionary algorithm for the NSP that introduces adaptive adversarial evaluation, where candidate schedules are assessed under dynamic competitive pressure to expose structural weaknesses and guide evolution more effectively. …”
Get full text
Get full text
Get full text
Article -
8
Crossover-first differential evolution for improved global optimization in non-uniform search landscapes
Published 2015“…This order of genetic operation contrasts with other evolutionary algorithms where crossover typically precedes mutation. …”
Get full text
Get full text
Get full text
Article -
9
-
10
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
Get full text
Get full text
Final Year Project -
11
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…This is considered a multi-objective problem because the problem involves optimizing more than one problem simultaneously subject to constraint(s). Evolutionary multi-objective algorithms are considered as good candidate for solving multi-objective optimization problems and have been applied to variety of problems in different areas. …”
Get full text
Get full text
Thesis -
14
Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah
Published 2010“…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
Get full text
Get full text
Research Reports -
15
-
16
An e-voting application using cryptography technology
Published 2020“…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
Get full text
Get full text
Research Reports -
18
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
Get full text
Conference or Workshop Item -
20
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper
