Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
1
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
2
-
3
-
4
A novel linear time corner detection algorithm
Published 2005“…We have presented a novel scheme for detecting corners of a planner object SRM05. The core of the algorithm is based upon slope analysis. …”
Get full text
Get full text
article -
5
A Multistage Passive Islanding Detection Method for Synchronous-Based Distributed Generation
Published 2021“…A multistage approach to passive islanding detection is proposed that utilizes a decision tree (DT) like classification algorithm. …”
Get full text
article -
6
-
7
-
8
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 1%. …”
Get full text
Get full text
article -
9
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…However, these methods are not always well founded because they depend heavily on the physician’s experience. …”
Get full text
Get full text
Get full text
Get full text
article -
10
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
11
-
12
-
13
-
14
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…The research is concluded with a conclusion section which recapitulates the results obtained and observations with regards to the current detection mechanisms and the applied machine learning algorithms. …”
Get full text
-
15
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
16
-
17
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
18
-
19
AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques
Published 2023“…The results of this study demonstrated the effectiveness of the proposed defect detection and localization algorithm as it managed to read all barcodes, localize defective columns, and binary classify the condition of the concrete covers against their surrounding objects. …”
Get full text
Get full text
Get full text
article -
20