Search Results - (( course evaluation ((path algorithm) OR (search algorithm)) ) OR ( _ detection based algorithm ))
Search alternatives:
- course evaluation »
- detection based »
- path algorithm »
-
1
CSC562: Information Retrieval and Searching Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
2
CSC742 - Storage and Retrieval Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
3
CSC742: Storage and Retrieval Algorithms / College of Computing, Informatics and Mathematics
Published 2018Get full text
Get full text
Get full text
Teaching Resource -
4
A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems
Published 2017“…The performances of the proposed cooperative hyper-heuristics are evaluated using the standard course timetabling benchmark problem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Evaluation of genetic algorithm based solar tracking system for photovoltaic panels
Published 2008“…In this paper, a genetic algorithm (GA) has been proposed utilizing sun tracking approaches to maximize the performance of PV panels. …”
Get full text
Get full text
Conference or Workshop Item -
6
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
7
Machine learning algorithms in context of intrusion detection
Published 2016“…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
8
Enhanced simulated annealing for solving aggregate production planning
Published 2016“…Since this algorithm works sequentially then the current state will generate only one in next state that will make the search slower and the drawback is that the search may fall in local minimum which represents the best solution in only part of the solution space. …”
Get full text
Get full text
Get full text
Article -
9
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
Get full text
Get full text
Thesis -
10
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
11
Determination of permeability characteristics of solid/liquid separation using simplex algorithm
Published 2013“…(iii) The optimum values of α1 and are searched by fitting theoretical time course of constant-pressure expression with experimental expression data by algorithm of simplex method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. …”
Get full text
Get full text
Get full text
Article -
13
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
18
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
19
Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework
Published 2019“…The proposed framework utilizes the Cross-Time approach for enhancing temporal community detection algorithm. The expected result shows that the Enhanced Temporal Community Detection Algorithm based on Cross Time approach for higher visibility in supply chain network is the major finding when implementing this proposed framework. …”
Get full text
Get full text
Get full text
Article -
20
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
Published 2014“…In this paper, we propose Edge Adaptive Steganalysis algorithm based on histograms of the absolute difference of adjacent pixels to detect EALMR. …”
Get full text
Get full text
Get full text
Get full text
Article
