Search Results - (( data detection method algorithm ) OR ( time optimization model algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm by Nik Ahmad Farihin, Mohd Zulkifli, Zuriani, Mustaffa, Mohd Herwan, Sulaiman

    Published 2025
    “…Finding suitable sets of hyperparameters for this task is time-consuming. Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…The researcher developed a new clustering model to separate the necessary data from unnecessary data, and specified the suitable primary stations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection by Sze Sin, Voon, Kho, Lee Chin, Ngu, Sze Song, Annie, Joseph, Kuryati, Kipli

    Published 2024
    “…To determine the optimal stopping point and safety distance between the UAV and the insulator, a mathematical model is presented that utilises the captured images and the machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A parallel ensemble learning model for fault detection and diagnosis of industrial machinery by Shing, Chiang Ta, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Sim, Seera, Manjeevan, Chee, Peng Lim

    Published 2023
    “…The base learners adopt a hybrid Back-Propagation (BP) and Particle Swarm Optimization (PSO) algorithms to exploit the corresponding local and global optimization capabilities for identifying optimal features and improving FDD performance. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…The early design of the augmented reality application exhibits potential for real-time data visualisation, providing insights into optimal detection distances and angles. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines by Tahan, M., Muhammad, M., Abdul Karim, Z.A.

    Published 2017
    “…Two back-propagation training algorithms, namely the Levenberg–Marquardt and Bayesian regularization algorithms, and the k-fold cross-validation technique, were employed to train the optimal networks using a training data set. …”
    Get full text
    Get full text
    Article
  17. 17

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…In order to reduce the training time and computational cost of the algorithm, Principal Components Analysis (PCA) pretraining strategy is deployed to obtain data adaptive filter banks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…This study extracted pothole area and volume information from fusion of Digital Elevation Model (DEM) and classified MS image. The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
    Get full text
    Get full text
    Thesis