Search Results - ((((restoration algorithm) OR (evolutionary algorithm))) OR (detection algorithm))
Search alternatives:
- restoration algorithm »
-
1
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
Get full text
Get full text
Thesis -
2
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
3
Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks
Published 2010“…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
Get full text
Get full text
Article -
4
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…First, we enhance the famous multiobjective evolutionary algorithms, which is a non-dominated sorting genetic algorithm (NSGA-II). …”
Get full text
Get full text
Get full text
Article -
5
Study of fuzzy based control algorithm for dynamic voltage restorer
Published 2023“…Algorithms; Control systems; Damage detection; Power quality; Voltage regulators; Voltage stabilizing circuits; Battery lifetime; DVR; Dynamic voltage restorer (DVR); Electrical components; EPLL; Improved control algorithms; Phase lock loop (PLL); Sensitive loads; Fuzzy logic…”
Article -
6
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…In this paper the result of an attempt to develop a substitute nonlinear model based on multilayer neural network (MLNN) and evolutionary algorithm (EA) for a single-shaft gas turbine having IGVs and VSVs is presented. …”
Get full text
Conference or Workshop Item -
7
Partitioning detection and connectivity restoration algorithm for WSAN
Published 2010“…This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
Get full text
Get full text
Get full text
Article -
9
Mitigation of voltage sags/swells using dynamic voltage restorer based on DQO algorithm / Mohamad Shahrun Azizan
Published 2009“…Voltage swells is a sudden increasing of supply voltage in rms voltage at network fundamental frequency cause by energizing large capacitor or switching off a large inductive load. A dynamic voltage restore based on the dqo algorithm is discussed. The control scheme is very effective to detect any disturbance in low voltage distribution systems. …”
Get full text
Get full text
Thesis -
10
Restoration of missing data in old archives based on genetic algorithm
Published 2014“…After applying most algorithms to detect the position of blotches and also scratch which is another type of defect in the old media, in each frame of video, it is essential to correct them, in other words, we should fill the missing data with reasonable values. …”
Get full text
Get full text
Conference or Workshop Item -
11
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…This post processing algorithm was provided based on a multi-level scanning and shape analysis which was presented for the better performance of high correct detection and lower false alarms for each given threshold. …”
Get full text
Get full text
Thesis -
12
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Article -
13
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
14
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020Subjects: Get full text
Get full text
Get full text
Article -
15
Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency
Published 2018“…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. In this work, we proposed an evolutionary cost-cognizant regression testing approach that prioritizes test case according to the rate of severity detection of test cases connected with dependent faults using genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Subjects: Get full text
Get full text
Thesis -
17
-
18
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
19
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
20
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item
