Search Results - (( from detection ((system algorithm) OR (search algorithm)) ) OR ( _ application a algorithm ))
Search alternatives:
- system algorithm »
- from detection »
- application a »
- a algorithm »
-
1
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The results of this study show that the proposed method which is the combination of Genetic Algorithm, Artificial Immune System (AIS) and local search has produced the desired results. …”
Get full text
Get full text
Thesis -
2
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…To confirm and validate the performance of the proposed improved SSA (ISSA), ISSA was applied on 18 datasets from UCI repository. In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
5
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…Experiments on a set of images from BioID face database proved that by using GA to search on a large number of feature types and sets, the proposed technique referred to as GABoost was able to obtain the cascades of boosted classifiers for the face detection system that can give higher detection rates (94.25%), lower false positive rates (55.94%) and less training time (6.68 hours).…”
Get full text
Get full text
Get full text
Thesis -
6
Face detection and stereo matching algorithms for smart surveillance system with IP cameras
Published 2010“…In this paper, we describe a smart surveillance system to detect human faces in stereo images with applications to advanced video surveillance systems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…In the validation process, the results showed a superior finding compared to the firefly algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Unravel parking difficulty via relative chain code algorithm / Chan Huey Min
Published 2005“…This system will allow drivers to quickly locate an available parking space without hassle, thus they can save time from searching for vacant space. …”
Get full text
Get full text
Thesis -
9
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…Hence, „Detecting Indoor Positioning of Moving Object using Wi-Fi Triangulation Algorithm for Kid Tracker Application‟ as a part of process in Kid Tracker Application to keep track our kids movement by focusing inside the building (shopping mall). …”
Get full text
Get full text
Undergraduates Project Papers -
10
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
11
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…Two metaheuristic algorithms i.e., Harmony Search (HS) and Gravitational Search Algorithm (GSA), are selected to integrate separately with a Radial Basis Function Network with Dynamic Decay Adjustment (RBFN-DDA) to perform condition monitoring in industrial processes. …”
Get full text
Get full text
Get full text
Thesis -
12
A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges
Published 2025“…Metaheuristic algorithms have emerged as promising techniques for optimizing human activity recognition (HAR) systems. …”
Get full text
Get full text
Get full text
Article -
13
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The results show that the proposed infeasible path detection method was efficient and detect 99 percent of the infeasible paths in the three industrial systems. …”
Get full text
Get full text
Get full text
Thesis -
14
Smart surveillance system based on stereo matching algorithms with IP and PTZ cameras
Published 2010“…In this paper, we describe a system for smart surveillance using stereo images with applications to advanced video surveillance systems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Foreground segmentation-based human detection with shadow removal
Published 2010“…In order for the system to function, it requires robust method for detecting human form from a given input of video streams. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
Get full text
Get full text
Article -
19
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…On experimenting and analysing the framework, there are 4767 benign applications from 10 different categories was collected from Android official market place and 3443 malware applications was collected from AndroZoo dataset. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
