Search Results - (( (evolution OR solution) detection method algorithm ) OR ( using optimisation based algorithm ))

Refine Results
  1. 1

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation by Illias, Hazlee Azil, Wee, Zhao Liang

    Published 2018
    “…Dissolved Gas Analysis (DGA) technique is commonly used to identify oil-filled power transformer fault type but utilisation of artificial intelligence method with optimisation methods has shown convincing results. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer by Ravindran, Nadarajan

    Published 2023
    “…The performance of SVM can be affected by hyperparameters, which are kernel scale and known as gamma and regularization parameters (C). A metaheuristic algorithm is introduced to optimise the hyperparameters. …”
    Get full text
    Get full text
    Thesis
  7. 7

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…In this project we do propose a construction of “DurianCare”, a mobile application that able to utilize techniques of Convolutional Neural Networks (CNN), Precision Agriculture, and Content Based Filtering for enhancing the farming practices of sustaining crops by advanced disease detection and the guided recommendation. The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  11. 11

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    Intergrated multi-objective optimisation of assembly sequence planning and assembly line balancing using particle swarm optimisation by M. F. F., Ab Rashid

    Published 2013
    “…The aim of this research is to establish a methodology and algorithm for integrating ASP and ALB optimisation using Particle Swarm Optimisation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Application of the bees algorithm for constrained mechanical design optimisation problem by Kamaruddin, Shafie, Abd Latif, Mohd Arif Hafizi

    Published 2019
    “…Nowadays, many optimisation algorithms have been introduced due to the advancement of technology such as Teaching Learning Based Optimisation (TLBO), Ant Colony Optimisation (ACO), Particle Swarm Optimisation (PSO) and the Bees Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The algorithm is a hybrid algorithm that operates using dual level search strategy that takes merits of a particle swarm optimisation algorithm and a modified adaptive bats sonar algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20