Search Results - (( based optimization _ algorithm ) OR ( pattern detection using algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…In accordance with the result, this article proposes a novel chew count estimation based on particle swarm optimization (PSO). First, the base of the algorithm is developed based on counting the peak of the chewing signal. …”
    Get full text
    Get full text
    Article
  4. 4

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom

    Published 2022
    “…In accordance with the result, this article proposes a novel chew count estimation based on particle swarm optimization (PSO). First, the base of the algorithm is developed based on counting the peak of the chewing signal. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
    Get full text
    Get full text
    Thesis
  8. 8

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…In this research, technique selection is done by doing some literature review to find the best one and also studying about the algorithm of each technique has. The result of hereditary ratio will be gained by implementing statistical percentage based on average differences of threshold value. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…The ADAM optimizer effectively tackles challenges in continuous parameter optimization by dynamically updating the model's weights and biases, adapting the learning rate for each parameter based on accumulated historical gradient information to achieve more efficient minimization of the loss function during training. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
    Get full text
    Thesis
  11. 11

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Detecting lung cancer region from CT image using meta-heuristic optimized segmentation approach by Shakeel, Pethuraj Mohamed, Mohd Aboobaider, Burhanuddin, Salahuddin, Lizawati

    Published 2022
    “…In this paper, the butterfly optimization algorithm-based K-means clustering (BOAKMC) method is introduced for reducing CT image segmentation uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Classification of Emphysema Patterns in Computed Tomography Based On Gabor Filter by Tengku Azis, Tengku Mohd Syamim

    Published 2015
    “…In this research, a Gabor-based emphysema classification algorithm is proposed. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Classification of diabetic retinopathy clinical features using image enhancement technique and convolutional neural network / Abdul Hafiz Abu Samah by Abu Samah, Abdul Hafiz

    Published 2021
    “…In general, this thesis introduces an automated machine learning algorithm for detecting diabetic retinopathy (DR) in fundus images. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq by Uzair , Ishtiaq

    Published 2024
    “…Combining Local Binary Patterns (LBP) based texture features and deep learning features resulted in the creation of the fused features vector which was then optimized using Binary Dragonfly Algorithm (BDA) and Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Thesis