Search Results - (( model evaluation methods algorithm ) OR ( based detection system algorithm ))*
Search alternatives:
- evaluation methods »
- methods algorithm »
- model evaluation »
- system algorithm »
-
1
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
Get full text
Get full text
Get full text
Article -
4
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…In addition, four types of intrusion detection evaluation datasets were applied to evaluate the proposed model in comparison to the others. …”
Get full text
Get full text
Get full text
Article -
6
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
7
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…To secure these critical infrastructures, security measures should be examined and implemented. These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
8
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
9
Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems
Published 2025“…This project develops an AI-based anomaly detection system. In the field of autonomous driving, abnormal data will directly affect the safety of autonomous driving systems, especially in terms of abnormal camera sensor data. …”
Get full text
Get full text
Get full text
Article -
10
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…The proposed algorithm is based on orthogonal moments which are considered as features to detect transitions. …”
Get full text
Get full text
Get full text
Article -
11
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
12
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
Get full text
Get full text
Get full text
Thesis -
13
Automatic Textile Stain Detection Using Yolo Algorithm
Published 2024“…This research paper proposes a novel approach for automatic textile stain detection using the YOLO (You Only Look Once) algorithm, a state-of-the-art object detection model. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…An experimental analysis is conducted by several experiments to evaluate the performance of the proposed ensemble methods which has been tested on the 4 benchmark datasets, namely LingSpam, SpamAssassin, Spambase and CSDMC2010. …”
Get full text
Get full text
Thesis -
15
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. …”
Get full text
Get full text
Thesis -
16
-
17
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
18
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…On the other hand, network compression and acceleration techniques such as pruning and quantization also been the focus of the studies for light-weight algorithms in embedded system. While in our studies, we primarily focusing on the deployment and fine-tuning of deep learning model which is YOLOv5 for PCB defects detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…The results showed that network-based intrusion detection system could be employed for early detection of intrusion due to the excellent performance recorded which were 94.92% of accuracy, 97.97% for sensitivity, and 0.69% for FPR…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
A pond-surface-based Biofloc-farm health-monitoring system for African catfish using deep learning methods
Published 2022“…The objective of this research is; (i) To model a standard training database selection criterion on the fish behaviour in relation to their health, (ii) To develop an algorithm that can determine the health of the fish based on the behaviour of the fish, (iii) To implement and test the fish behaviour detection algorithm in a Biofloc fish pond to validate and evaluate the effectiveness of the system. …”
Get full text
Get full text
Get full text
Academic Exercise
