Search Results - (( form detection method algorithm ) OR ( based optimization method algorithm ))
Search alternatives:
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
2
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
Get full text
Get full text
Article -
3
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Article -
6
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
Get full text
Get full text
Thesis -
7
3D LiDAR Vehicle Perception and Classification Using 3D Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
9
Optimizing the travel distance between mosque and muslim affair activities using Delaunay Triangulation / Siti Nor Dalila Shamsul Bahar
Published 2019“…There are many algorithms in the method of Delaunay triangulation. …”
Get full text
Get full text
Thesis -
10
-
11
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
12
Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance
Published 2025“…Recent studies have shown that this challenge can be addressed by employing machine learning algorithms for detection. Some studies have also implemented various feature selection methods to optimize detection efficiency. …”
Get full text
Get full text
Get full text
Article -
13
Fault Detection using Dynamic Parity Space Approach
Published 2012“…Then, technological advances which require complex computation such as artificial intelligence and genetic algorithm had made tremendous improvement to fault Detection and Isolation (FDI) analysis. …”
Get full text
Get full text
Get full text
Article -
14
Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli
Published 2015“…The case study use for this experiment is Sobel edge detection algorithm. The test data set focuses on processing images of three different sizes; (IK x IK), (2K x 2K) and (3K x 3K). …”
Get full text
Get full text
Thesis -
15
A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah
Published 2012“…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
Get full text
Get full text
Thesis -
16
Condition monitoring of deep drilling process for cooling channel making in hot press die
Published 2016“…Consequently, ANN is the most suitable method to classify tool condition, and are capable to be employed for online tool failure detection system which is beneficial for optimizing tool condition in industries.…”
Get full text
Get full text
Undergraduates Project Papers -
17
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
Get full text
Get full text
Get full text
Thesis -
19
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
Published 2016“…The proposed feature sets along with selected feature extraction methods from the literature are analyzed and compared by using supervised learning techniques (i.e. support vector machines, nearest-neighbor, naïve Bayesian, neural network, logistic regression, and ensemble trees classifier), as well as unsupervised learning techniques (i.e. probabilistic-based and nearest-neighbor-based algorithms). …”
Get full text
Get full text
Thesis -
20
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis
