Search Results - (( binary classifications learning algorithms ) OR ( evolution optimization task algorithm ))

Refine Results
  1. 1

    A New Quadratic Binary Harris Hawk Optimization For Feature Selection by Abdullah, Abdul Rahim, Too, Jing Wei, Mohd Saad, Norhashimah

    Published 2019
    “…A comparative study is conducted to compare the effectiveness of QBHHO with other feature selection algorithms such as binary differential evolution (BDE), genetic algorithm (GA), binary multi-verse optimizer (BMVO), binary flower pollination algorithm (BFPA), and binary salp swarm algorithm (BSSA). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A New Co-Evolution Binary Particle Swarm Optimization With Multiple Inertia Weight Strategy For Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…The proposed method is validated with ten benchmark datasets from UCI machine learning repository. To examine the effectiveness of proposed method, four recent and popular feature selection methods namely BPSO, genetic algorithm (GA), binary gravitational search algorithm (BGSA) and competitive binary grey wolf optimizer (CBGWO) are used in a performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An improved algorithm for iris classification by using support vector machine and binary random machine learning by Kamarulzalis, Ahmad Haadzal

    Published 2018
    “…The second objective is to conduct a supervised and binary ensemble machine learning technique for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Analysis Of Personal Protective Equipment Classification Method Using Deep Learning by Siti Zahrah Nur Ain, Silopung

    Published 2022
    “…Based on the result, CNN algorithm is a good algorithm as the binary classification of PPE achieved high accuracy result.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Enabling more optimality and adaptability to the dynamic nature of CDTO, we propose a novel Variable-Length multi-objective Whale optimization Integrated with Differential Evolution designated as VL-WIDE for joint cloudlet deployment and tasks offloading. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media by Sutranggono, Abi Nizar, Sarno, Riyanarto, Ghozali, Imam

    Published 2024
    “…The Multi-Class Multi-Level (MCML) classification algorithm was applied to perform detailed classification and address the limitations of the research scope using several approaches, including machine learning, deep learning, and transfer learning approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution by Tijani, Ismaila B., Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2014
    “…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem by Yusof, Norfadzlia Mohd, Muda, Azah Kamilah, Pratama, Satrya Fajri, Carbo-Dorca, Ramon, Abraham, Ajith

    Published 2023
    “…The new Binary Whale Optimization Algorithm is integrated with wrapper feature selection and validated on descriptor selection problem to improve Amphetamine-type stimulants drug classification result. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Novel Aggregate Classification Technique Using Moment Invariants and Cascaded Multilayered Perceptron Network by Md Sani, Zamani

    Published 2009
    “…The c-MLP network consists of three MLPs which are arranged in a serial combination and trained with the same learning algorithm. The proposed method has been tested and compared with twelve machine learning algorithms namely Levenberg-Marquardt (LM), Broyden-Fletcher-Goldfarb-Shanno quasi-newton (BFG), Resilient back propagation (RP), Scaled conjugate gradient (SCG), Conjugate gradient with Powell-Beale restarts (CGB), Conjugate gradient with Fletcher-Reeves updates (CGF), Conjugate gradient with Polak-Ribiere updates (CGP), One step secant (OSS), Bayesian regularization (BR), Gradient descent (GD), Gradient descent with momentum and adaptive learning rate (GDX) and Gradient descent with momentum (GDM) algorithms. …”
    Get full text
    Get full text
    Article
  14. 14

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…A simulated Khepera robot is evolved by a Pareto-frontier Differential Evolution (POE) algorithm, and learned through a 3-layer feed-forward artificial neural network, attempting to simultaneously fulfill two conflicting objectives of maximizing robot phototaxis behavior while minimizing the neural network's hidden neurons by generating a Pareto optimal set of controllers. …”
    Get full text
    Get full text
    Research Report
  17. 17

    Heat exchanger network optimization using differential evolution with stream splitting by Thuy, N.T.P., Pendyala, R., Marneni, N.

    Published 2014
    “…This article introduces a new strategy for HEN optimization using differential evolution algorithm. …”
    Get full text
    Get full text
    Article
  18. 18

    Machine learning approach for stress detection based on alpha-beta and theta-beta ratios of EEG signals by Altaf, Hunain, Ibrahim, Siti Noorjannah, Mohd Azmin, Nor Fadhillah, Asnawi, Ani Liza, Walid, Balqis Hanisah, Harun, Noor Hasmiza

    Published 2021
    “…This study will ultimately contribute to society's development with improved robust machine learning algorithm for binary classification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    GPU-accelerated extractive multi-document text summarization using decomposition-based multi-objective differential evolution by Wahab, Muhammad Hafizul Hazmi, Abdul Hamid, Nor Asilah Wati, Subramaniam, Shamala, Latip, Rohaya, Othman, Mohamed

    Published 2025
    “…Multi-document text summarization is computationally intensive, mainly when employing complex optimization algorithms. The computational demands increase significantly due to the integration of complex optimization algorithms and the computationally expensive repair operator. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…This signifies that CSDE-V-Detectors can efficiently attain highest detection rates and lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis