Search Results - (( (evolution OR solution) feature detection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…However, the MBGWO has several issues in finding a good quality solution. Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method by Al-Mohair, Hani Kaid Saif

    Published 2017
    “…Based on these feature extraction results, a system based on a combination of an MLP ANN and k-means clustering which employs the YIQ color space and the statistical features of human skin as inputs is developed for human skin detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…This research utilises the web page phishing detection dataset, which consists of 11,430 URLs with 87 features. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Md. Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2019
    “…The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…Thus, a swarm-based hybrid approach is proposed for cancer classification with a new variant of the Firefly Algorithm (FA) and Correlation-based Feature Selection (CFS) filter. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC by Merrad, Yacine, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Gunawan, Teddy Surya

    Published 2020
    “…Consequently, the comparative study shows the overall good performance of the system achieving 100% detection accuracy with features’ rich model and 90% detection accuracy with features’ poor model, indicating the viability of the proposed solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems by Bouke, Mohamed Aly, Abdullah, Azizol, Cengiz, Korhan, Akleylek, Sedat

    Published 2024
    “…This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection algorithm designed to enhance model performance in machine learning applications. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The results showed that Decision Tree with Chi-Square feature selection achieved the highest detection accuracy of 98.6% which was higher than other classifiers.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A static analysis approach for android permission-based malware detection systems by Juliza, Mohamad Arif, Mohd Faizal, Ab Razak, Suryanti, Awang, Sharfah Ratibah, Tuan Mat, Nor Syahidatul Nadiah, Ismail, Ahmad Firdaus, Zainal Abidin

    Published 2021
    “…The goal of this research is to examine the effectiveness of static analysis to detect Android malware by using permission-based features. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.] by Afolabi, Akindele Segun, Akinola, Olubunmi Adewale, Odetoye, Oyinlolu Ayomidotun, Adetiba, Emmanuel

    Published 2025
    “…In this paper, three algorithms were developed: the first was for outlier removal from features, the second was for feature selection, and the third was for partial-features-availability-aware ML model selection. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Currently, there are several solutions for bots detection. However, the accuracy of the detection still needs improvement. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Malware authors use android market as a hub for malicious apps and spread malware to users with the intention to threaten privacy; and this has remained undetected due to the weakness in signature-based detection. A major problem with malware detection is the existence of numerous features in malware code and the need to look at the relevant features in malware analysis. …”
    Get full text
    Get full text
    Get full text
    Article