Search Results - (( based evaluation search algorithm ) OR ( based detection system algorithm ))

Search alternatives:

Refine Results
  1. 1

    Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin by Suhaimi, Hamizan, Suliman, Saiful Izwan, Musirin, Ismail

    Published 2021
    “…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Moreover, it is very important that the algorithms should be general and not so complicated which could be implemented for all systems.Therefore, this research presents design and development of a novel method, which is called dual search maximum power point (DSMPP) algorithm, for tracking the GMPP under PSCs. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The results of the proposed search-based test data generator show significant performance compared to the existing search-based test data generator.…”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Formulation Of A Maximum Power Point Tracking (Mppt) Algorithm For Hydrokinetic Energy Harnessing by Muhammad Naqib, Mazalan

    Published 2022
    “…The results will be evaluated based on energy harnessing and performance efficiency between HCS and proposed algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Tracking of moving athlete from video sequences using fower pollination algorithm by Ong, Pauline, Chong, Tang Keat, Ong, Kok Meng, Low, Ee Soong

    Published 2022
    “…The comparative analysis shows that the FPA is comparable with other competing algorithms in terms of detection rate, tracking accuracy and processing time.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
    Get full text
    Get full text
    Thesis
  17. 17

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
    Get full text
    Get full text
    Article
  18. 18

    Human upper body pose region estimation by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini, Shafie, Amir Akramin, Salami, Momoh Jimoh Eyiomika

    Published 2013
    “…The tracking the HUB pose is based on the face detection algorithm. Our evaluation was done mainly using 50 images from INRIA Person Dataset.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Moreover, the characterization mainly on the negative return strokes also significantly contributed to the development of the lightning detection system. Those studies mostly performed the characterization using a conventional method based on manual observations. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Moreover, the characterization mainly on the negative return strokes also significantly contributed to the development of the lightning detection system. Those studies mostly performed the characterization using a conventional method based on manual observations. …”
    Get full text
    Get full text
    Get full text
    Article