Search Results - (( model detection method algorithm ) OR ( model optimization method algorithm ))

Refine Results
  1. 1

    A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail

    Published 2023
    “…However, it is hard to determine the fuzzy parameter manually in a complex problem, and the process of generating the parameter is called fuzzy modelling. Therefore, an optimization method is needed to solve this issue, and one of the best methods to be applied is Butterfly Optimization Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Neural network algorithm-based fall detection modelling by Mohd Yusoff, Ainul Husna, Koh, Cheng Zhi, Ngadimon, Khairulnizam, Md Salleh, Salihatun

    Published 2020
    “…However, the improvement of model accuracy is still needed. This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif by Abdalla Osama , Hamdan Abdellatif

    Published 2024
    “…However, the challenge of class imbalance and high dimensionality in clinical data significantly impedes the efficacy of Machine Learning (ML) models in this domain. This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm by Nik Ahmad Farihin, Mohd Zulkifli, Zuriani, Mustaffa, Mohd Herwan, Sulaiman

    Published 2025
    “…Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Thus, this study is looking for better, new dataset and more reliable optimized method for detecting the intrusion with highest accuracy. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Automatic Textile Stain Detection Using Yolo Algorithm by Keerthan, N., Ushasree, , Priyanka, Mohan

    Published 2024
    “…This research paper proposes a novel approach for automatic textile stain detection using the YOLO (You Only Look Once) algorithm, a state-of-the-art object detection model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Overhead view based person counting using deep learning by Kaw, Chee Zhao

    Published 2022
    “…Hence, the overall performance of the YOLOv4-tiny model integrated with DeepSORT algorithm outperforms the other tracking algorithms.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
    Get full text
    Conference or Workshop Item