Search Results - (( features detection method algorithm ) OR ( based optimization max algorithm ))
Search alternatives:
- features detection »
- method algorithm »
- optimization max »
- max algorithm »
-
1
-
2
A particle swarm optimization and min-max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids
Published 2017“…The algorithm selects the best scheduling solutions based on the proposed constraint-handling strategy. …”
Get full text
Get full text
Article -
3
-
4
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
5
Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system
Published 2011“…In this paper, we propose a fair bandwidth assignment algorithm that allocates the bandwidth among different services classes based on a hierarchical scheduler. …”
Get full text
Get full text
Conference or Workshop Item -
6
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…To address this problem, this research presents a fake news detection method that combines different features and developing methods for the most crucial phases in the detection process, including feature extraction, feature selection and fake news detection phases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
Get full text
Get full text
Thesis -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
9
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…One example of such a network is called WiMAX which is driven by WiMAX Forum based on IEEE 802.16 Wireless MAN standard. …”
Get full text
Get full text
Get full text
Article -
10
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
11
Cross-layer design using multi-channel system in WiMAX mesh networks
Published 2008“…The WiMAX mesh networks based on IEEE 802.16 standard is a key topology for the next generation wireless networking. …”
Get full text
Get full text
Conference or Workshop Item -
12
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…This study provides a comprehensive analysis and comparison of six prevalent scheduling algorithms, namely FCFS, SJF, LJF, EDF, Max-Min, and PSO, under varying cloudlet loads of 200,400,600,800, and 1000. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…Hence, these approaches regularly fail to provide optimal results on specific graph instances. These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
16
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
18
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
20
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article
