Search Results - (( simulation optimization method algorithm ) OR ( features detection system algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  3. 3

    Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system by Tiong, Meng Chung

    Published 2021
    “…In this study, a four-module 980 W solar PV system together with a DC/DC Boost Converter model was developed in MATLAB-Simulink as the MPPT algorithm test platform. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal resource allocation for NOMA wireless networks by Albogamy, Fahad R., Aiyashi, M. A., Hashim, Fazirul Hisyam, Imran Khan, Choi, Bong Jun

    Published 2022
    “…The major goal is to maximize the users’ maximum weighted sum rate. The suggested algorithm’s most notable feature is that it converges to the global optimal solution. …”
    Get full text
    Get full text
    Article
  5. 5

    High impedance fault detection and localization in 11kV distribution system / Mohd Syukri Ali by Mohd Syukri , Ali

    Published 2018
    “…Subsequent algorithm simulation results show that the proposed methods are able to detect and subsequently locate the faults with high accuracies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A novel islanding detection technique using modified Slantlet transform in multi-distributed generation by Hizam, Hashim, Ahmadipour, Masoud, Mohd Radzi, Mohd Amran, Othman, Mohammad Lutfi, Chireh, Nikta

    Published 2019
    “…Islanding and non-islanding events are simulated for a multi-distributed generations system and used to assess the performance of the proposed anti-islanding protection method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…However, the current research state is unsatisfactory, especially in terms of structural design, robot system and the robot control method. In this research, an EMG controlled 3D printed robot hand prototype with improved features and advance hand posture classification method based on EMG signal pattern were proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone by Saipullah, Khairul Muzzammil

    Published 2013
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Article
  12. 12

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Feature-based face recognition system using utilized artificial neural network by Chai, Tong Yuen

    Published 2010
    “…Then, the proposed features cropping system will crop the detected iris and mouth automatically. …”
    Get full text
    Thesis
  15. 15

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
    Get full text
    Get full text
    Article
  18. 18

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
    Get full text
    Get full text
    Conference or Workshop Item