Search Results - (( _ application swarm algorithm ) OR ( (parameter OR parameters) detection method algorithm ))*
Search alternatives:
- application swarm »
- method algorithm »
- swarm algorithm »
-
1
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm
Published 2025“…Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
Get full text
Get full text
Get full text
Article -
4
Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification
Published 2022“…However, finding the most appropriate deep learning algorithm for a medical classification problem along with its optimal parameters becomes a difficult task. …”
Get full text
Get full text
Thesis -
5
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…Preprocessing components such as corner detection and chord length parameterization are also explained in this thesis. …”
Get full text
Get full text
Thesis -
6
Optimization of feature selection in Support Vector Machines (SVM) using recursive feature elimination (RFE) and particle swarm optimization (PSO) for heart disease detection
Published 2024“…One effective approach to detect heart disease is to use Support Vector Machine (SVM) as a machine learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Color image enhancement of acute leukemia cells in blood microscopic image for leukemia detection sample
Published 2020“…This report introduces a new enhancement method which is a combination of Particle swarm optimization (PSO) algorithm and contrast stretching, known as Hybrid PSO-Contrast stretching (HPSO-CS). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
9
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
12
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
13
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
14
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
15
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
Get full text
Get full text
Thesis -
17
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
18
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…This study focuses on the parameter estimation and outlier detection for some types of the circular model. …”
Get full text
Get full text
Thesis
