Search Results - (( feature operation learning algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Improved whale optimization algorithm for feature selection in Arabic sentiment analysis by Tubishat, Mohammad, Abushariah, Mohammad A.M., Idris, Norisma, Aljarah, Ibrahim

    Published 2019
    “…The first improvement includes using Elite Opposition-Based Learning (EOBL) at initialization phase of WOA. The second improvement involves the incorporation of evolutionary operators from Differential Evolution algorithm at the end of each WOA iteration including mutation, crossover, and selection operators. …”
    Get full text
    Get full text
    Article
  2. 2

    Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms by Masrom, S., Rahman, R.A., Mohamad, M., Rahman, A.S.A., Baharun, N.

    Published 2022
    “…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  3. 3

    Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms by Masrom, S., Rahman, R.A., Mohamad, M., Rahman, A.S.A., Baharun, N.

    Published 2022
    “…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning by Chimeleze C., Jamil N., Ismail R., Lam K.-Y., Teh J.S., Samual J., Akachukwu Okeke C.

    Published 2023
    “…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
    Article
  6. 6

    Metaheuristic algorithms for feature selection (2014–2024) by Faizan, Muhammad, Muhammad Arif, Mohamad

    Published 2025
    “…Swarm intelligence and evolutionary algorithms—including genetic algorithms, particle swarm optimization, and the zebra optimization algorithm—have operated effectively in this area. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A New And Fast Rival Genetic Algorithm For Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2021
    “…Presently, many metaheuristic optimization algorithms were successfully applied for feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Control of a robot arm using iterative learning algorithm with a stopping criterion by Mailah, Musa, Chong, Jonathan Wun Shiung

    Published 2002
    “…The robust performance of a robot control scheme is vital to ensure that the robot accomplishes its tasks desirably in a constraint environment involving disturbances, parametric changes, uncertainties and varied operating conditions. The study introduces the Active Force Control and Iterative Learning Algorithm (AFCAIL) scheme with an improved feature in the form of a suitably designed stopping criterion incorporated in the control strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…Static analysis is where the static features are examined. Too many features used, features extraction time consuming and the reliability of accuracy result by various machine learning algorithm are the main issues spotted in static analysis approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. Machine learning algorithms have widely been adopted recently to enhance the performance of IDSs. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Static hand gesture recognition using artificial neural network / Haitham Sabah Hasan by Hasan, Haitham Sabah

    Published 2014
    “…The back-propagation learning algorithm is employed in the multi-layer neural network classifier. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Real‑time chatter detection during turning operation using wavelet scattering network by Sharma, Sanjay, Gupta, Vijay Kumar, Rahman, Mustafizur, Saleh, Tanveer

    Published 2024
    “…The automatic extracted chatter features are then used in supervised machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Operating a reservoir system based on the shark machine learning algorithm by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Ehteram, Mohammad, Hossain, Md Shabbir, El-Shafie, Ahmed

    Published 2018
    “…Therefore, the development of a mathematical optimization model is crucial for selecting the optimal policies for the reservoir operation. In the current study, the shark machine learning algorithm (SMLA) is proposed to develop an optimal rule for operating the reservoir. …”
    Get full text
    Get full text
    Article
  15. 15

    Comparative study of informative acoustic features for VTOL UAV faulty prediction using machine learning by Mohd Sani, Fareisya Zulaikha, Makhtar, Siti Noormiza, Mohd Nor, Elya, Kamarudin, Nur Diyana, Md Ali, Syaril Azrad, Md Ali, Kurnianingsih

    Published 2025
    “…Pitch, zero-crossing and short-time energy are selected as the significant audio features for the machine learning classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Feature selection for high dimensional data: An evolutionary filter approach. by Yahya, Anwar Ali, Osman, Addin, Ramli, Abdul Rahman, Balola, Adlan

    Published 2011
    “…Problem statement: Feature selection is a task of crucial importance for the application of machine learning in various domains. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil by Jamil, Nur Syafiqah

    Published 2021
    “…The selection features involved were based on Experiment 1 which included 17 IVs (all features) without excluding the most significant variable for this research.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin by AmirHussin, 'Afina

    Published 2019
    “…The purpose of study is to extract the boundary of image, find the corner point and compare between two algorithms. However, this study applied morphology operation to extract the boundary image by using erosion operation. …”
    Get full text
    Get full text
    Thesis