Search Results - (( (parameter OR parameters) detection method algorithm ) OR ( using evolution method algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan, Raja Abdullah, Raja Syamsul Azmir, Al-Dabbagh, Rawaa Dawoud Hassan, Hashim, Fazirulhisyam

    Published 2013
    “…This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Digital economy tax compliance model in Malaysia using machine learning approach by Raja Azhan Syah Raja Wahab, Azuraliza Abu Bakar

    Published 2021
    “…Based on the validation of training data with the presence of seven single classifier algorithms, three performance improvements have been established through ensemble classification, namely wrapper, boosting, and voting methods, and two techniques involving grid search and evolution parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  18. 18

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…This study focuses on the parameter estimation and outlier detection for some types of the circular model. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…Next, the insignificant peak is removed by introducing an argument of minimum peak prominence and maximum peak width where the value of the parameters needs to be determined. As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
    Get full text
    Get full text
    Article