Search Results - (evolutionary OR evolution) ((evaluation techniques) OR (detection techniques))
Search alternatives:
- evaluation techniques »
- detection techniques »
-
1
Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency
Published 2018“…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. …”
Get full text
Get full text
Get full text
Article -
2
On the automation of vulnerabilities fixing for web application
Published 2014“…The research community have devoted considerable amount of efforts to address this problem by proposing many techniques for automated vulnerabilities detection and fix generation for web application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The proposed technique is named Evolutionary Cost-Cognizant Regression Test Case Prioritization (ECRTP). …”
Get full text
Get full text
Thesis -
4
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. …”
Get full text
Get full text
Get full text
Article -
5
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…One of the most dynamic areas in AI research is object detection, a field that continues to evolve due to advancements in chip computing power and deep learning techniques. …”
Get full text
Get full text
Article -
6
Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation
Published 2018“…The superiority of the modified PSO technique with SVM was evaluated by comparing the results with the actual fault diagnosis, unoptimised SVM and previous reported works. …”
Get full text
Get full text
Article -
7
Metric-based code smell detection technique for python software
Published 2018“…In the second phase, details of conceptual and architectural design of the metric-based technique are presented. Thirdly, PySTect technique is implemented and evaluated in three experiments. …”
Get full text
Get full text
Thesis -
8
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
Get full text
Get full text
Thesis -
9
Performance analysis of spectrum sensing methods: A numerical approach
Published 2023“…Errors; Femtocell; Heterogeneous networks; Intelligent systems; Monte Carlo methods; Numerical methods; Orthogonal frequency division multiplexing; Critical challenges; HetNeT; Numerical approaches; Orthogonal frequency division multiplexing systems; Performance analysis; Spectrum; Spectrum detection; Spectrum sensing techniques; Long Term Evolution (LTE)…”
Conference Paper -
10
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
Get full text
Get full text
Get full text
Article -
11
Driving fatigue detection system using haar cascade technique
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
13
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013“…The problem of determining simultaneously the model order and coefficient of an Autoregressive Moving Average (ARMA) model is examined in this paper. An Evolutionary Algorithm (EA) comprising two-level Differential Evolution (DE) optimization scheme is proposed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
Get full text
Get full text
Get full text
Article -
15
Dynamic risk analysis on process safety: a review of the evolution, approach, and advantages in the industry / Nurul Hazira Zizemurikan
Published 2022“…Dynamic risk assessment is a scientific technique for identifying hazards, evaluating risk, and appraising the working environment. …”
Get full text
Get full text
Student Project -
16
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
Get full text
Get full text
Article -
17
From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks
Published 2017“…Previously, spectrum sensing was the main technique for detecting the presence/absence of a primary user (PU) signal in a given radio frequency (RF) spectrum. …”
Get full text
Get full text
Get full text
Article -
18
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…Therefore, this thesis presents novel techniques for voltage stability evaluation and enhancement in power system. …”
Get full text
Get full text
Thesis -
19
Comparison of detection model using machine learning on android malware / Muhammad Ikmal Ihsan
Published 2022“…It also evaluated and train the selection of Android characteristics to evaluate the malware detection model's performance. …”
Get full text
Get full text
Student Project -
20
Computational intelligence based approach for enhanced distance relay design
Published 2024text::Final Year Project
