Search Results - (( data detection search algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- detection search »
- java application »
- data detection »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
4
A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method
Published 2018“…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
Get full text
Get full text
Get full text
Article -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…The experimental result have proved that ACO-PFMDM have improved the overall performance of protein functional module detection. The search process of ACO-PFMDM has converged effectively compared to some state-of-art algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The results of the proposed search-based test data generator show significant performance compared to the existing search-based test data generator.…”
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
Get full text
Get full text
Get full text
Article -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
12
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
13
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
14
An ensemble feature selection method to detect web spam
Published 2018“…Web spam detection is one of research fields of data mining. …”
Get full text
Get full text
Get full text
Article -
15
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
Published 2017“…For a small PPI data size, ACO has been successfully applied to but it is not suitable for large and noisy PPI data, which has caused to premature convergence and stagnation in the searching process. …”
Get full text
Get full text
Thesis -
16
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
Published 2017“…For a small PPI data size, ACO has been successfully applied to but it is not suitable for large and noisy PPI data, which has caused to premature convergence and stagnation in the searching process. …”
Get full text
Get full text
Thesis -
17
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
Get full text
Get full text
Thesis -
18
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
19
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…Many fields such as data science, data mining suffered from the rapid growth of data volume and high data dimensionality. …”
Get full text
Get full text
Article -
20
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
Get full text
Get full text
Get full text
Article
