Search Results - (( rate detection based algorithm ) OR ( shape classification swarm algorithm ))
Search alternatives:
- shape classification »
- classification swarm »
- detection based »
- swarm algorithm »
- rate detection »
-
1
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…Moreover, skin lesion images are clustered based on fused color, pattern and shape based features. …”
Get full text
Get full text
Get full text
Article -
2
Swarm intelligence-based feature selection for amphetamine-type stimulants (ATS) drug 3D molecular structure classification
Published 2021“…For this purpose, the binary version of swarm algorithms facilitated with the S-shaped or sigmoid transfer function known as binary whale optimization algorithm (BWOA), binary particle swarm optimiza-tion algorithm (BPSO), and new binary manta-ray foraging opti-mization algorithm (BMRFO) are developed for feature selection. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A New Quadratic Binary Harris Hawk Optimization For Feature Selection
Published 2019“…This paper proposes the binary version of HHO (BHHO) to solve the feature selection problem in classification tasks. The proposed BHHO is equipped with an S-shaped or V-shaped transfer function to convert the continuous variable into a binary one. …”
Get full text
Get full text
Get full text
Article -
4
Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering
Published 2022“…Among multi-objective evolutionary algorithms proposed in the literature, particle swarm optimization (PSO)-based multi-objective (MOPSO) algorithm has been cited to be the most representative. …”
Get full text
Get full text
Thesis -
5
Machine learning algorithms in context of intrusion detection
Published 2016“…Although, signature based has high detection rate but it cannot detect novel attacks. …”
Get full text
Get full text
Conference or Workshop Item -
6
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…Experimental results demonstrate the effectiveness of our proposed shape classification and retrieval approach in comparison with state-of-the-art methods. …”
Get full text
Get full text
Article -
7
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…Experimental results demonstrate the effectiveness of our proposed shape classification and retrieval approach in comparison with state-of-the-art methods. …”
Get full text
Get full text
Article -
8
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Experimental results show the proposed technique increases accuracy classification percentage up to 99.95%; and the minimum number of bins determine good discretization algorithm. Consequently, attack detection rate increases and false positive alarm rate minimizes. …”
Get full text
Get full text
Thesis -
9
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
11
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
12
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
Get full text
Get full text
Book Chapter -
13
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
Get full text
Get full text
Book Chapter -
14
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…To achieve that, an anthrax disease outbreak is chosen as a case study.Two artificial anthrax datasets known as WSARE7 and WSARE58 are taken as experiment data.The experiment is measured based on five metrics; detection rate, specificity, false alarm rate, accuracy, and time taken to produce result. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
16
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
17
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
18
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
Get full text
Get full text
Get full text
Article -
19
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…The utilization of cascade architecture to the extracted features, benefits the algorithm. The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
