Search Results - (( simulation optimization model algorithm ) OR ( features detection method algorithm ))
Search alternatives:
- optimization model »
- features detection »
- method algorithm »
- model algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
text::Thesis -
3
Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system
Published 2021“…To lift the limitation off, a new hybrid model named Hybrid MFO (HMFO) was proposed based on the combination of feature from MFO and conventional P&O, together with an additional partial shading detection feature. …”
Get full text
Get full text
Thesis -
4
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…The fault detection algorithm identifies the time and location of each fault. …”
Get full text
Get full text
Thesis -
5
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
6
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…To address this problem, this research presents a fake news detection method that combines different features and developing methods for the most crucial phases in the detection process, including feature extraction, feature selection and fake news detection phases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
8
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
9
-
10
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
11
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article -
12
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…Genetic algorithm and simulated annealing techniques are used to optimize the control parameters of the neural network. …”
Get full text
Get full text
Article -
13
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
15
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
16
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…This paper involves engine modeling in 1D software simulation environment, GT-Power. …”
Get full text
Get full text
Proceeding Paper -
17
OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING
Published 2009“…Converter models for simulation are designed for the forward and backup modes of operation. …”
Get full text
Get full text
Citation Index Journal -
18
OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING
Published 2009“…Converter models for simulation are designed for the forward and backup modes of operation. …”
Get full text
Get full text
Citation Index Journal -
19
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper
