Search alternatives:
pass algorithm » jaya algorithm (Expand Search)
data detection » data injection (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
pass algorithm » jaya algorithm (Expand Search)
data detection » data injection (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
-
1
-
2
Detecting sleep outside the clinic using wearable heart rate devices
Published 2022“…We developed and tested a heart rate-based algorithm that captures inter- and intra-individual sleep differences in free-living conditions and does not require human input. …”
-
3
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
Published 2022“…The classification performance is determined via different metrics for various GA-based ANN classifiers using data extracted from the healthy and faulty data of the GCPV system. …”
-
4
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…A fast waveform sampling facility has been recently developed and integrated into the VAX-based data acquisition system at the Center for Applied Physical Sciences (CAPS). …”
Get full text
Get full text
article -
5
-
6
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022“…The proposed improved ABO method consists in reducing the number of samples in the training data set using the Euclidean distance and extracting the most significant features from the reduced data using ABO algorithm. …”
-
7
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
Get full text
-
8
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
Published 2023“…Finally, PSO and RPSO-based interval centers and ranges and upper and lower bounds techniques are developed to deal with model uncertainties in WES. …”
-
9
Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions
Published 2017“…For this purpose, computer programs based on updated pattern recognition algorithms were developed for joint-detection and classification of rock types to offer an estimated strength. …”
Get full text
Get full text
Get full text
conferenceObject -
10
Unsupervised outlier detection in multidimensional data
Published 2022“…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …”
-
11
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
12
-
13
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …”
Get full text
Get full text
Get full text
Get full text
article -
14
Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems
Published 2022“…Therefore, the paper discusses the development of the Lévy flight-based reptile search algorithm with local search capability and evaluates its potential against challenging power systems engineering optimization problems. …”
Get full text
-
15
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
16
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
17
Web Based Online Hybrid Teaching Method of Network Music Course
Published 2022“…In the context of big data, the lengthy personalized screening process of users has become one of the problems to be solved. Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …”
Get full text
-
18
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu
Published 2024Subjects: -
19
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
20
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text