Search Results - (( data detection using algorithm ) OR ( evolution optimisation based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Performance evaluation and benchmarking of an extended computational model of ant colony system for DNA sequence design by Zuwairie, Ibrahim, Mohd Falfazli, Mat Jusof, Mohd Zaidi, Mohd Tumari

    Published 2014
    “…Ant colony system (ACS) algorithm is one of the biologically inspired algorithms that have been introduced to effectively solve a variety of combinatorial optimisation problems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A competitive co-evolutionary approach for the nurse scheduling problem by Mohamad Nazri, Maizatul Farhana, Mohd Yusoh, Zeratul Izzah, Basiron, Halizah, Daud, Azlina

    Published 2026
    “…The competitive approach further exhibits smoother convergence behaviour across generations, indicating stronger optimisation dynamics and improved robustness. These findings demonstrate that competitive co-evolution provides an effective and practical alternative to static fitness-based evolutionary methods for nurse scheduling, with broader applicability to healthcare scheduling and constraint optimisation problems.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, Fakhrud Din, Shah Khalid, Kamal Zuhairi Zamli, Aftab Alam

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, ., Fakhrud, Din, Shah, Khalid, Kamal Z., Zamli, Alam, Aftab

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  12. 12

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    B-spline curve fitting with different parameterization methods by Kheng, Jia Shen

    Published 2020
    “…After generating control points, distance between the generated and original data points is used to identify the error of the algorithm. Later, genetic algorithm and differential evolution optimization are used to optimise the error of the curve. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…This approach that is according to the DNN model reduces irrelevant features in the intrusion detection data sets of CICIDS2017 to improve the accuracy and cluster high-scale data sets. …”
    Get full text
    Get full text
    Thesis