Search Results - (( form detection method algorithm ) OR ( based optimization method algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
    Get full text
    Get full text
    Article
  3. 3

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
    Get full text
    Get full text
    Article
  6. 6

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance by Rafrastara, Fauzi Adi, Ghozi, Wildanil, Sani, Ramadhan Rakhmat, Handoko, Lekso Budi, Abdussalam, Abdussalam, Pramudya, Elkaf Rahmawan, M. Abdollah, Faizal

    Published 2025
    “…Recent studies have shown that this challenge can be addressed by employing machine learning algorithms for detection. Some studies have also implemented various feature selection methods to optimize detection efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Fault Detection using Dynamic Parity Space Approach by Mohamed Basri, H., Lias, K., Wan Zainal Abidin, W.A, Tay, Kai Meng, Hushairi, Zen

    Published 2012
    “…Then, technological advances which require complex computation such as artificial intelligence and genetic algorithm had made tremendous improvement to fault Detection and Isolation (FDI) analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…The case study use for this experiment is Sobel edge detection algorithm. The test data set focuses on processing images of three different sizes; (IK x IK), (2K x 2K) and (3K x 3K). …”
    Get full text
    Get full text
    Thesis
  15. 15

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Condition monitoring of deep drilling process for cooling channel making in hot press die by Muhamad Aslam, Abdul Raub

    Published 2016
    “…Consequently, ANN is the most suitable method to classify tool condition, and are capable to be employed for online tool failure detection system which is beneficial for optimizing tool condition in industries.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…The proposed feature sets along with selected feature extraction methods from the literature are analyzed and compared by using supervised learning techniques (i.e. support vector machines, nearest-neighbor, naïve Bayesian, neural network, logistic regression, and ensemble trees classifier), as well as unsupervised learning techniques (i.e. probabilistic-based and nearest-neighbor-based algorithms). …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis