Search Results - (( work detection method algorithm ) OR ( based optimization based algorithm ))
Search alternatives:
-
1
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…In conclusion, this work has presented an improved optimization algorithm that can improve the accuracy of IDSs in the detection of various types of network attack.…”
Get full text
Get full text
Thesis -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
3
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
Get full text
Get full text
Get full text
Article -
4
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
5
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
6
A new hybrid teaching learning based optimization -extreme learning machine model based intrusion-detection system
Published 2023“…This work is focused on providing two main goals; firstly, analysis based on the main methods and limitations of the most-recent hybrid model-based on intrusion detection, secondly, to propose a novel hybrid IDS model called TLBO-ELM based on the Firefly algorithm and Fast Learning Network.…”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…In conclusion, this study presented a novel hybrid evolutionary algorithm based on the combination of AHP with GBCS to specify optimal RFID reader positions and amount based on the working train station domain. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…In this work, the perturb and observation (P&O) method based on duty cycle adjustment is introduced, which is modified to increase speed of the search and also to reduce the oscillation.The simulation and experimental works have been performed to investigate behavior and performance of the proposed algorithm. …”
Get full text
Get full text
Thesis -
10
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
Get full text
Thesis -
11
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
13
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
14
Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation
Published 2019“…This is called hybrid artificial bee colony (HABC) strategy, which is based on hybridize of an artificial bee colony (ABC) algorithm with a particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
15
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
Get full text
Get full text
Thesis -
16
Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification
Published 2022“…Fuzzy clustering-based filtering methods are introduced for essential feature selection. …”
Get full text
Get full text
Thesis -
17
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…In these experiments, it was demonstrated that the FLN optimization method achieved 0.9964 which is a higher accuracy than most of the existing paradigms for classifying network intrusion detection data.…”
Get full text
Get full text
Thesis -
18
SINR improvement using Firefly Algorithm (FA) for Linear Constrained Minimum Variance (LCMV) beamforming technique
Published 2023Conference Paper -
19
-
20
Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices
Published 2021“…The proposed solution is based on the optimization method developed from a combination of the Artificial Bee Colony and Hill Climbing algorithms (ABC-HC) to give the optimal placement and sizing of DG units to be deployed in the system. …”
Get full text
Get full text
Thesis
