Search Results - (( sets detection a algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7
  8. 8

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Under several different algorithm settings, several EW pattern sets are obtained. …”
    Get full text
    Get full text
    Article
  9. 9

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Under several different algorithm settings, several EW pattern sets are obtained. …”
    Get full text
    Get full text
    Article
  10. 10

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Signature is used as a feature to identify the user by extracting a set of features. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…Besides that, a comparison is made with Cumulative Sum, Exponentially-weighted Moving Average, and Multi Layer Perceptron.From the experiment, the best parameter setting for anthrax outbreak using dendrite cell algorithm is identified whereby it proven can helps the model to produce a good detection result between detection rate and false alarm rate.Since each outbreak disease carries different outbreak characteristic, the parameter setting for different outbreak might be different.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Experiments on a set of images from BioID database proved that by using GA to search on large number of feature types and sets, GABoost is able to obtain cascade of boosted classifiers for a face detection system that can give higher detection rates, lower false positive rates and less training time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm by Mohd. Zin, Zalhan

    Published 2007
    “…With these new feature types and larger search space, Genetic Algorithm (GA) is used within the Adaboost framework, to find sets of features which can provide a better cascade of boosted classifiers with a shorter training time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Model-based hybrid variational level set method applied to lung cancer detection by Jing, Wang, Liew, Siau-Chuin, Azian, Abd Aziz

    Published 2024
    “…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
    Get full text
    Get full text
    Get full text
    Article