Search Results - (( form detection method algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Article
  5. 5

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    MRI brain tumor detection methods using contourlet transform based on time adaptive self-organizing map by Ali Farzamnia, Seyed Hamidreza Hazaveh, Seyede Safieh Siadat, Ervin Gubin Moung

    Published 2023
    “…In this article, we propose a novel method that uses contourlet transform and time adaptive self-organizing map, optimized by the whale optimization algorithm, in order to distinguish between benign and malignant brain tumors in MRI images. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…This project research will present the PMCC Heatmap to choose the optimal attributes for using machine learning to detect cryptojacking in order to utilise machine learning to detect embedded malware. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Face emotion recognition using artificial intelligence techniques by Kartigayan Muthukaruppan

    Published 2008
    “…The acquired images have gone through few preprocessing methods. The edge detection has to be successful even when the intensity of light is uneven. …”
    Get full text
    Thesis
  14. 14

    Fault Detection using Dynamic Parity Space Approach by Mohamed Basri, H., Lias, K., Wan Zainal Abidin, W.A, Tay, Kai Meng, Hushairi, Zen

    Published 2012
    “…Then, technological advances which require complex computation such as artificial intelligence and genetic algorithm had made tremendous improvement to fault Detection and Isolation (FDI) analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance by Rafrastara, Fauzi Adi, Ghozi, Wildanil, Sani, Ramadhan Rakhmat, Handoko, Lekso Budi, Abdussalam, Abdussalam, Pramudya, Elkaf Rahmawan, M. Abdollah, Faizal

    Published 2025
    “…Recent studies have shown that this challenge can be addressed by employing machine learning algorithms for detection. Some studies have also implemented various feature selection methods to optimize detection efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…Each experiment highlight the advantages and disadvantages of the experimental architecture.The disadvantages from each experiment prompts the design of dynamic parallel partitioning and allocating framework. The case study use for this experiment is Sobel edge detection algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Condition monitoring of deep drilling process for cooling channel making in hot press die by Muhamad Aslam, Abdul Raub

    Published 2016
    “…Consequently, ANN is the most suitable method to classify tool condition, and are capable to be employed for online tool failure detection system which is beneficial for optimizing tool condition in industries.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis