The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article describes the optimization real-time implementation of Viola & Jones face detection algorithm, based adaboost, on RISC processor combined with a genetic approach (called AdaBoost/GA). This algorithm detects the faces in image or video sequences, with rate detection about 97% on the basis of image CMU & MIT. In this work we present a study of the algorithm in terms of complexity...
This paper provides on effective Shuffled Embedded Technique (SET) to eliminate the drawback of substitution technique. Using the genetic algorithm, message bits are embedded into multiple, vague (blurred) and higher LSB layer in order to increase robustness, which is achieved by embedding secret messages in digital audio stream. Additional careful considerations are taken against the premeditated...
In this paper, an improved technique for evolving wavelet coefficients refined for compression and reconstruction of fingerprint images is presented. The FBI fingerprint compression standard uses the cdf 9/7 wavelet filter coefficients. Lifting scheme is an efficient way to represent classical wavelets with fewer filter coefficients. Here Genetic algorithm (GA) is used to evolve better lifting filter...
In the design of electrical machinery, direct search methods of conventional optimization techniques are widely used. In the recent years, Genetic Algorithm (GA) has been successfully applied to the design optimization of electromagnetic devices and electrical machinery. In this paper, an optimal design method to optimize the cost of three phase Induction Motor (IM) is presented. The motor design...
Tracking of a ballistic target in its reentry phase by considering the radar measurements is a highly complex problem in nonlinear filtering. Kalman Filter (KF) is used to estimate the positions of the target when the measurements are corrupted with noise. If the measurements (range and bearing) are nonlinear then Unscented Kalman filter (UKF) can be used. For obtaining reliable estimate of the target...
An approach to detection of phishing hyperlinks using the rule based system formed by genetic algorithm is proposed, which can be utilized as a part of an enterprise solution to anti-phishing. A legitimate webpage owner can use this approach to search the web for suspicious hyperlinks. In this approach, genetic algorithm is used to evolve rules that are used to differentiate phishing link from legitimate...
Wireless communication devices are widely subjected to intruder attacks and in the existing security system, the algorithm consists of a ranging phase that uses the received signal strength to estimate a network radio map and a localization phase which uses a genetic algorithm to obtain the most likely position of the intruder node within the map using the genetic algorithm which is not time consuming...
In this paper, we report a classifier ensemble technique using the search capability of genetic algorithm (GA) for Named Entity Recognition (NER) in biomedical domain. We use Maximum Entropy (ME) framework to build a number of classifiers depending upon the various representations of a set of features. The proposed technique is evaluated with the JNLPBA 2004 data sets that yield the overall recall,...
This paper presents the results achieved by fault classifier ensembles based on a model-free supervised learning approach for diagnosing faults on oil rigs motor pumps. The main goal is to compare two feature-based ensemble construction methods, and present a third variation from one of them. The use of ensembles instead of single classifier systems has been widely applied in classification problems...
The field of digital systems has undergone a major revolution in recent decades. Circuits are shrinking in physical size while growing both in speed and range of capabilities. This rapid advancement is not without serious problems, however. Especially worrisome are verification and testing, which become more important as the system complexity increases and time-to-market decreases. Genetic algorithms...
Palmprint identification is a subcategory of biometrics identification, which can be efficiently used to identify the people. Palmprint-based identification is currently a potential alternative to human identification method of a well known fingerprint-based identification. For example, if the hand of the identified person is dirty, the accuracy of fingerprint-based identification is distorted, while...
The aim of this paper is to study the tuning of a PID controller using soft computing techniques. The methodology and efficiency of the proposed method are compared with that of traditional methods. Determination or tuning of the PID parameters continues to be important as these parameters have a great influence on the stability and performance of the control system. The results obtained reflect that...
Detecting communities from complex networks has triggered considerable attention in several application domains. Targeting this problem, a local search based genetic algorithm (GALS) which employs a graph-based representation (LAR) has been proposed in this work. The core of the GALS is a local search based mutation technique. Aiming to overcome the drawbacks of the existing mutation methods, a concept...
In order to overcome this shortage of general rough set theory, the elementary concept of tolerance rough set theory is proposed, and the theory is employed to build objects' tolerance relations that can correctly classify objects in system. First, we use genetic algorithms to search for the optimal thresholds, then construct special matrix for attributes and objects. Thus we can get the relations...
Swarm Intelligence is the one of the most efficient and emergent techniques for global optimization. Artificial Bee Colony Algorithm (ABCA) is one of the new swarm intelligent population-based meta-heuristic approaches, inspired by foraging behavior of bees for function optimization. To enhance the efficiency of ABCA optimizer this paper proposes a novel hybrid approach involving genetic algorithms...
Intrusion detection systems (IDS) usually trigger a great number of alarm messages that frequently overwhelm their human operators. Hierarchically clustering technique is able to help IDS operators to get meaningful overviews from the great number of alarms. A dilemma is encountered when the clusters are generated. If the clusters are obtained one by one, they cannot be prevented from overlapping...
This paper addresses the automatic generation of RF integrated inductors model. In this work the double p-model is used as a way of characterizing the inductor behaviour over a frequency range beyond the self-resonant value. For the evaluation of the model element values analytical expressions based on technology parameters as well as on the device geometric characteristics are used. The use of a...
In this paper, a strategy for automatic tuning of predictive controller synthesis parameters based on multi-objective optimization (MOO) is proposed. This strategy integrates the genetic algorithm to generate the synthesis parameters (the prediction horizon, the control horizon and the cost weighting factor) making a compromise between closed loop performances (the overshoot, the variance of the control...
Premature convergence is the main obstacle to the application of genetic algorithm. This paper makes improvement on traditional genetic algorithm by linear scale transformation of fitness function, using self-adaptive crossover and mutation probability and adopting close relative breeding avoidance method. Simulation results show that the improved algorithm outperforms traditional genetic algorithm...
We propose an approach in the form of a light weight smart fuzzer to generate string based inputs to detect buffer overflow vulnerability in C code. The approach is based on an evolutionary algorithm which is a combination of genetic algorithm and evolutionary strategies. In this preliminary work we focus on the problem that there are constraints on string inputs that must be satisfied in order to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.