Search Results - (( based evaluation search algorithm ) OR ( based detection system algorithm ))
Search alternatives:
- evaluation search »
- based evaluation »
- system algorithm »
- based detection »
-
1
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
Get full text
Get full text
Get full text
Article -
2
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Moreover, it is very important that the algorithms should be general and not so complicated which could be implemented for all systems.Therefore, this research presents design and development of a novel method, which is called dual search maximum power point (DSMPP) algorithm, for tracking the GMPP under PSCs. …”
Get full text
Get full text
Thesis -
3
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
4
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
6
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The results of the proposed search-based test data generator show significant performance compared to the existing search-based test data generator.…”
Get full text
Get full text
Get full text
Thesis -
7
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
8
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
9
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…However, ACO-based reactive search technique has three (3) problems. …”
Get full text
Get full text
Get full text
Thesis -
10
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
11
Formulation Of A Maximum Power Point Tracking (Mppt) Algorithm For Hydrokinetic Energy Harnessing
Published 2022“…The results will be evaluated based on energy harnessing and performance efficiency between HCS and proposed algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
13
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article -
14
Tracking of moving athlete from video sequences using fower pollination algorithm
Published 2022“…The comparative analysis shows that the FPA is comparable with other competing algorithms in terms of detection rate, tracking accuracy and processing time.…”
Get full text
Get full text
Get full text
Article -
15
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
16
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
Get full text
Get full text
Thesis -
17
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
Get full text
Get full text
Article -
18
Human upper body pose region estimation
Published 2013“…The tracking the HUB pose is based on the face detection algorithm. Our evaluation was done mainly using 50 images from INRIA Person Dataset.…”
Get full text
Get full text
Get full text
Book Chapter -
19
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Moreover, the characterization mainly on the negative return strokes also significantly contributed to the development of the lightning detection system. Those studies mostly performed the characterization using a conventional method based on manual observations. …”
Get full text
Get full text
Get full text
Article -
20
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Moreover, the characterization mainly on the negative return strokes also significantly contributed to the development of the lightning detection system. Those studies mostly performed the characterization using a conventional method based on manual observations. …”
Get full text
Get full text
Get full text
Article
