Search Results - (( code classification system algorithm ) OR ( parallel optimisation based algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…The optimisation of tool path length based on ACO algorithm ascertained that the cutting tool remove the uncut line once and able to eliminate the uncut region in the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan, Chin Hooi, Tan, Mei Sze, Chang, Siow Wee, Yap, Keem Siah, Yap, Hwa Jen, Wong, Shen Yuong

    Published 2018
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Get full text
    Get full text
    Article
  4. 4

    Image classification based on sparse-coded features using sparse coding technique for aerial imagery: a hybrid dictionary approach by Qayyum A., Saeed Malik A., Saad N.M., Iqbal M., Abdullah M.F., Rasheed W., Abdullah T.A.B.R., Bin Jafaar M.Y.

    Published 2023
    “…Aerial photography; Aircraft detection; Antennas; Codes (symbols); Discrete cosine transforms; Discrete wavelet transforms; Glossaries; Image classification; Image coding; Image enhancement; Learning algorithms; Learning systems; Object recognition; Remote sensing; Satellite imagery; Satellites; Unmanned aerial vehicles (UAV); Discrete tchebichef transforms; Discriminative features; Finite Ridgelet Transform; Histogram of oriented gradients; Image processing and computer vision; Scale invariant feature transforms; SIFT; Sparse coding; Classification (of information)…”
    Article
  5. 5

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Genetic algorithm fuzzy logic for medical knowledge-based pattern classification by Tan C.H., Tan M.S., Chang S.-W., Yap K.S., Yap H.J., Wong S.Y.

    Published 2023
    “…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  12. 12
  13. 13
  14. 14
  15. 15

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…The results of this research are important in developing a routing algorithm for CHR6o3.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…The performance of the classification system would be greatly degraded. To overcome this difficulty and to improve the performance of the system, a de-noising scheme is proposed to be used together with the system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Classification of metamorphic virus using n-grams signatures by A Hamid, Isredza Rahmi, Md Sani, Nur Sakinah, Abdullah, Zubaile, Mohd Foozy, Cik Feresa, Kipli, Kuryati

    Published 2020
    “…Metamorphic virus has a capability to change, translate, and rewrite its own code once infected the system to bypass detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Modelling of clinical risk groups (CRGs) classification using FAM by Mohd. Asi, Salina, Saad, Puteh

    Published 2006
    “…FAM is a fast learning algorithm and used less epoch training [4]. Based on its performance in doing the classification, FAM is theoretically suitable to do the CRGs classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    REAL TIME ABNORMAL SOUND DETECTION AND CLASSIFICATION FOR HOME ENVIRONMENT by MOHAMED AMIN, SITI NUR AZIMAH

    Published 2011
    “…In this project, a system is designed to have abnormal sound detection and classification. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Malware attacks are attacks carried out by an attacker by sending malicious codes to various files or even many packages and servers. …”
    Get full text
    Get full text
    Get full text
    Article