Search Results - (( evolution optimization svm algorithm ) OR ( variable detection using algorithm ))

Refine Results
  1. 1

    Improved whale optimization algorithm for feature selection in Arabic sentiment analysis by Tubishat, Mohammad, Abushariah, Mohammad A.M., Idris, Norisma, Aljarah, Ibrahim

    Published 2019
    “…In SA, feature selection phase is an important phase for machine learning classifiers specifically when the datasets used in training is huge. Whale Optimization Algorithm (WOA) is one of the recent metaheuristic optimization algorithm that mimics the whale hunting mechanism. …”
    Get full text
    Get full text
    Article
  2. 2

    Time series predictive analysis based on hybridization of meta-heuristic algorithms by Mustaffa, Zuriani, Sulaiman, Mohd Herwan, Rohidin, Dede, Ernawan, Ferda, Kasim, Shahreen

    Published 2018
    “…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
    Get full text
    Get full text
    Article
  3. 3

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Alan Fan et aI., [2] use Support Vector Machine (SVM) to stock market prediction. The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article
  4. 4

    Time series predictive analysis based on hybridization of meta-heuristic algorithms by Zuriani, Mustaffa, M. H., Sulaiman, Rohidin, Dede, Ernawan, Ferda, Shahreen, Kasim

    Published 2018
    “…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…Finally, rule-based optimisation techniques such as Particle Swarm Optimization (PSO), Differential Evolution (DE) and Grey Wolf Optimizer (GWO) were used to minimise the amount of time employed in the stock market turning points prediction. …”
    Get full text
    Get full text
    Book Section
  10. 10
  11. 11

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. Furthermore, a linear model has been built to facilitate the accomplishment of the fault detection of the industrial servo system by using the proposed observer. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A real time road marking detection system on large variability road images database by Khan, Bahadur Shah, Hanafi, Marsyita, Mashohor, Syamsiah

    Published 2017
    “…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  15. 15

    Road Sign Detection and Recognition System for Real-Time Embedded Applications by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2011
    “…In this paper, we propose a road sign detection and recognition algorithm for an embedded application, which requires computationally simple but accurate algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fault detection and diagnosis for gas density monitoring using multivariate statistical process control by Norul Shahida, Che Din, Noor Asma Fazli, Abdul Samad, Chin, Sim Yee

    Published 2011
    “…Multivariate analysis technique i.e., Principal Component Analysis (PCA) and Partial Correlation analysis (PCorrA) are used to determine the correlation coefficients between the process variables and quality variables while control chart with the calculated correlation coefficients are used to facilitate the Fault Detection and Diagnosis (FDD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…Consequently, any changes on these two variables cause the agent to use the PNDT to update the norms in complying with the domain's normative protocol. …”
    Short Survey