Search Results - (( time optimization method algorithm ) OR ( features detection using algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm by Zuwairie, Ibrahim, Mohd Zaidi, Mohd Tumari, Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Mohd Ibrahim, Shapiai

    Published 2014
    “…The main intention of this study is to find the significant peak features in time domain approach and this can be done using feature selection methods such as gravitational search algorithm (GSA) and particle swarm optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…The accuracy of fake news detection models relies mainly on the quality of the extracted features and the method used in detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…In the next phase, the datasets are optimized using the Salp Swarm Algorithm (SSA), which improves classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa'

    Published 2025
    “…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa’

    Published 2025
    “…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system by Tiong, Meng Chung

    Published 2021
    “…To further evaluate the real-time performance of the MPPT algorithms, hardware-in-the-loop (HIL) was utilized to emulate the behavior of the PV system and power converter while a digital signal processor (DSP) was used to implement the MPPT algorithms in study. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Computationally enhanced UAV-based real-time pothole detection using YOLOv7-C3ECA-DSA algorithm by Mat Radzi, Siti Fairuz, Abd Rahman, Mohd Amiruddin, Muhammad Yusof, Muhammad Khairul Adib, Mohd Haniff, Nurin Syazwina, Rahmat, Romi Fadillah

    Published 2025
    “…Despite these limitations, the research significantly advances real-time pothole detection by striking an optimal balance between computational efficiency and detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20