Search Results - (((evolutionary OR solution) algorithm) OR (((section algorithm) OR (detection algorithm))))

Refine Results
  1. 1

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…In this paper the result of an attempt to develop a substitute nonlinear model based on multilayer neural network (MLNN) and evolutionary algorithm (EA) for a single-shaft gas turbine having IGVs and VSVs is presented. …”
    Get full text
    Conference or Workshop Item
  2. 2

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
    Get full text
    Get full text
    Book Section
  3. 3
  4. 4

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Identifying types of Partial Discharge (PD) is very crucial in order to prepare and provide solutions before complete breakdown occurs. Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
    Get full text
    Get full text
    Book Section
  8. 8

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mardhiah Abdul Jalil by Shamsudin, Muhammad Azziq, Aminuddin, Raihah, Abdul Jalil, Ummu Mardhiah

    Published 2022
    “…Their facial expression is measure and determine based on Rating of Perceived Exertion (RPE) scale. The object detection machine learning model used in this project is Single Shot Detector (SSD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10
  11. 11

    A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works by Gorment N.Z., Selamat A., Krejcar O.

    Published 2023
    “…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
    Conference Paper
  12. 12

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Navigation algorithms are tested in a variety of differently shaped environments to encourage the development of robust solutions, and reduce the possibility of solutions based on memorization of a fixed set of movements. …”
    Get full text
    Get full text
    Monograph
  16. 16

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm by Nejad, Mohsen Fadaee

    Published 2013
    “…Load estimation, tilt angle optimization and multi-objective optimization are on the last sections. HOGA, as a new effective tool for multi-objective optimization by evolutionary algorithm is used in this research. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…In the validation process, the results showed a superior finding compared to the firefly algorithm. It was able to detect more tags by 3%, and a reduced number of readers by 16.6%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Hence, the presented solutions are unable to identify active processes that are currently related to critical sections and dead in the network communication. …”
    Get full text
    Get full text
    Thesis