Search Results - (( parameter optimization method algorithm ) OR ( terms detection method algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Model-based hybrid variational level set method applied to object detection in grey scale images by Wang, Jing

    Published 2024
    “…To address these challenges, the proposed thesis introduces a novel model-based hybrid variational level-set method, termed VKMHLS, specifically tailored for object detection in grayscale images. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption by Alsammak I.L.H., Mahmoud M.A., Gunasekaran S.S., Ahmed A.N., Alkilabi M.

    Published 2024
    “…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
    Article
  9. 9

    CT reconstruction algorithm and low contrast detectability of phantom study: a systematic review and meta-analysis by Yusof, Nur Aimi Adibah, Abdul Karim, Muhammad Khalis, Mohd Asikin, Nursyazalina, Paiman, Suriati, Awang Kechik, Mohd Mustafa, Abd Rahman, Mohd Amiruddin, Mohd Noor, Noramaliza

    Published 2022
    “…Furthermore, the association between the CT parameter such as tube voltage and the type of reconstruction algorithm, the amount of phantom scanning affecting the image quality and the exposure dose were also investigated in this study. …”
    Get full text
    Get full text
    Article
  10. 10

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    High impedance fault detection and localization in 11kV distribution system / Mohd Syukri Ali by Mohd Syukri , Ali

    Published 2018
    “…Fault simulations were carried out using iv the PSCAD/EMTDC software to obtain the distorted voltage and current waveforms during the HIF events. Subsequent algorithm simulation results show that the proposed methods are able to detect and subsequently locate the faults with high accuracies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…For the unsupervised learning method, the hierarchical cluster analysis can correctly cluster the samples in terms of their damage states. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Optimisation of support vector machine hyperparameters using enhanced artificial bee colony variant to diagnose breast cancer by Ravindran, Nadarajan

    Published 2023
    “…Breast cancer is the leading cause of cancer-related deaths among women globally. Early detection through methods such as mammography and biopsy are crucial in reducing cancer-related mortality. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Optimization of turning parameters using genetic algorithm method by Shah Izwandi, Mohd Zawawi

    Published 2008
    “…This study about development of optimization for turning parameters based on the Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Parameters optimization of surface grinding process with particles swarm optimization, gravitational search, and sine cosine algorithms: a comparative analysis by Asrul, Adam

    Published 2018
    “…The efficiency of the three algorithms are evaluated and compared with previous results obtained by other optimization methods on similar studies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item