Search Results - (( based detection mining algorithm ) OR ( simulation optimization method algorithm ))

Refine Results
  1. 1

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  2. 2

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng by Cheong, Dianne L.M., Sia Abdullah, Nur Atiqah

    Published 2006
    “…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng by L., Dianne M. Cheong, Sia Abdullah, Nur Atiqah

    Published 2006
    “…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
    Get full text
    Get full text
    Research Reports
  6. 6

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  8. 8
  9. 9

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimization of turning parameters using genetic algorithm method by Shah Izwandi, Mohd Zawawi

    Published 2008
    “…The simulation based on Genetic Algorithm are successful develop and the optimum parameters values are obtained from the simulation.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  12. 12

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…This thesis proposes and simulates the three novel optimization algorithms to handle DG allocation, different single-objective, and multi-objective OPF problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A discrete simulated kalman filter optimizer for combinatorial optimization problems by Suhazri Amrin, Rahmad

    Published 2022
    “…An example of a numerical algorithm is the simulated Kalman filter (SKF). Various method has been introduced as an extension of a numerical algorithm to adapt it to a discrete search space. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…Additionally, the proposed framework also can detect the attack simultaneously using text mining approaches.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…Therefore, the effectiveness of route planning is very essential. The method to study route optimization is called shortest path method. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved particle swarm optimization by fast annealing algorithm by Bashath, Samar, Ismail, Amelia Ritahani

    Published 2019
    “…We also apply the algorithm in clustering problem, and the results shows that the proposed method has better accuracy than the optimization methods.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Asynchronous simulated kalman filter optimization algorithm by Zuwairie, Ibrahim, Nor Azlina, Ab. Aziz, Nor Hidayati, Abd Aziz, Tasiransurini, Ab Rahman

    Published 2018
    “…Simulated Kalman filter (SKF) is an optimization algorithm which is inspired by Kalman filtering method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article