Search Results - (( developing negative detection algorithm ) OR ( java optimization method algorithm ))

Refine Results
  1. 1

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan by Ruslan, Muhammad Rushamir Hakimi

    Published 2017
    “…This project presents a novel intelligence that inspired by immune system or specifically the Artificial Immune System. The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimize class time tabling by using genetic algorithm technique in UTHM by Ahmad, Izah Rafidah

    Published 2019
    “…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Computer aided detection Computer aided detection (CAD) is a tool developed to assist radiologist interpretations from diagnostic modalities to decrease observational oversights or false negative rates. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…IP-PBX face challenges in detecting and mitigating malicious traffic. In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
    Get full text
    Get full text
    Article
  18. 18

    Academic leadership bio-inspired classification model using negative selection algorithm by Jantan, Hamidah, Sa’dan, Siti ‘Aisyah, Che Azemi, Nur Hamizah Syafiqah

    Published 2015
    “…Negative selection algorithm has been successfully used in several purposes such as in fault detection, data integrity protection, virus detection and etc.due to the unique ability in self-recognition by classifying self or non-self’s detectors. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…Moreover, the characterization mainly on the negative return strokes also significantly contributed to the development of the lightning detection system. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat by Selamat, Nur Syuhada

    Published 2021
    “…It also caused many protections are developed to fight the malware. The most common method of detecting malware relies on signature-based detection. …”
    Get full text
    Get full text
    Thesis