Search Results - (( evolution activation selection algorithm ) OR ( java _ prevention algorithm ))

Refine Results
  1. 1

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection by Norfadzlan, Yusup, Izzatul Nabila, Sarbini, Dayang Nurfatimah, Awang Iskandar, Azlan, Mohd Zain, Didik Dwi, Prasetya

    Published 2026
    “…This research paper explores the performance of binary nature-inspired optimization algorithms as feature selection to enhance the identification of human activities using wearable technology. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic smart grid communication parameters based cognitive radio network by Haider H.T., Muhsen D.H., Shahadi H.I., See O.H., Elmenreich W.

    Published 2023
    “…The proposed system helps to drive optimal communication parameters to realize power saving, maximum throughput and minimum bit error rate communication modes. A differential evolution algorithm is used to select the optimal transmission parameters for given communication modes based on a fitness function that combines multiple objectives based on appropriate weights. …”
    Article
  7. 7

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images by Jamaludin, Shahrizan, Mohamad Ayob, Ahmad Faisal, Mohd Norzeli, Syamimi, Mohamed, Saiful Bahri

    Published 2022
    “…The findings revealed that the algorithm outperformed the other active contour-based approaches in computational time and segmentation accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Recognizing complex human activities using hybrid feature selections based on an accelerometer sensor by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2017
    “…In order to tackle this issue, the hybrid feature selection using Relief-f and differential evolution is proposed. …”
    Get full text
    Get full text
    Article
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  11. 11

    The femtocell - macrocell deployment towards the QoS provisioning in LTE network / Hasyimah Ahmad by Ahmad, Hasyimah

    Published 2016
    “…LTE-Sim is used to simulate the LTE-Femto network scenario and three packet scheduling algorithms; PF, MLWDF and EXP/PF were selected for downlink transmission to analyze the performance metrics of the triple play applications. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  13. 13

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin by Ong, Chung Sin

    Published 2013
    “…Metaheuristic is one of the “approximation methods” that is able to find practically acceptable solutions especially for large-scale problems within a limited amount of time. Genetic Algorithms (GA) which is based on biological evolution is one of the metaheuristics that has been successfully applied to JSSP. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu by Abdul Mannan, Dadu

    Published 2018
    “…The proposed control technique adopts 6 active voltage vectors in the discrete predictive model among 14 available active vectors based on the position of the future reference vector. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi by Abdul Hadi, Basharudin

    Published 2017
    “…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network 29 30 base of the specimen until the flow ceased..…”
    Get full text
    Get full text
    Book Section
  20. 20

    SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid by Khalid, Khairi

    Published 2017
    “…SWAT-CUP, which links SUFI-2 algorithm to SWAT models, has been utilized in the study for the calibration of SWAT models.…”
    Get full text
    Get full text
    Book Section