Search Results - (( parameter optimization max algorithm ) OR ( features detection using algorithm ))
Search alternatives:
- parameter optimization »
- features detection »
- optimization max »
- using algorithm »
- max algorithm »
-
1
Reactive approach for automating exploration and exploitation in ant colony optimization
Published 2016“…Ant colony optimization (ACO) algorithms can be used to solve nondeterministic polynomial hard problems. …”
Get full text
Get full text
Get full text
Thesis -
2
Evaluation of feature selection algorithm for android malware detection
Published 2018“…The Android features were filtered before detection process using TF-IDF algorithm. …”
Get full text
Article -
3
Ant colony optimization in dynamic environments
Published 2010“…The last objective of this thesis is to optimize the parameter settings of the best performing ant algorithm with local search. …”
Get full text
Get full text
Get full text
Thesis -
4
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The performance of different mechanisms utilized to perform the anomaly detection depends heavily on the group of features used. …”
Get full text
Get full text
Thesis -
5
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…This thesis proposes an optimized strategy namely cross-layer design in routing algorithms used find the best route for all SSs and scheduling algorithms, used to assign a time slot for each possible node transmission. …”
Get full text
Get full text
Thesis -
7
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
Get full text
Get full text
Thesis -
8
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
9
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…The accuracy of fake news detection models relies mainly on the quality of the extracted features and the method used in detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The quantitative results show that the ORB and SURF algorithms detect and match more features than other algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms
Published 2025“…A comprehensive data preprocessing pipeline was implemented, including missing value treatment, outlier removal, and feature normalization using Min-Max scaling. Three distinct metaheuristic algorithms were investigated: Barnacles Mating Optimizer (BMO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA), each integrated with CatBoost to optimize critical parameters including learning rate, tree depth, regularization, and bagging temperature. …”
Get full text
Get full text
Get full text
Article -
14
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
15
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
Get full text
Get full text
Thesis -
17
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…With these new feature types and larger search space, Genetic Algorithm (GA) is used within the Adaboost framework, to find sets of features which can provide a better cascade of boosted classifiers with a shorter training time. …”
Get full text
Get full text
Get full text
Thesis -
18
Feature-based face recognition system using utilized artificial neural network
Published 2010“…The main contributions of this project are the automatic algorithms for mouth detection, facial features cropping and face classification. …”
Get full text
Thesis -
19
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
20
SVM for network anomaly detection using ACO feature subset
Published 2016“…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
Get full text
Get full text
Conference or Workshop Item
