Search Results - (( using evolution method algorithm ) OR ( peer detection method algorithm ))

Refine Results
  1. 1

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. The aim of this project was to detect a hidden message in an observed message using text steganalysis.…”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  3. 3

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan, Raja Abdullah, Raja Syamsul Azmir, Al-Dabbagh, Rawaa Dawoud Hassan, Hashim, Fazirulhisyam

    Published 2013
    “…This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…We refer to the new DE algorithm as random variable length crossover DE (rvlx- DE) algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin by Shamsuddin, Mohd Razif, Abd Hamid, Nurzeatul Hamimah, Jasmin, Muhammad Syafiq

    Published 2012
    “…This product aims to achieve this goal. A Neural Network Method and Convexity Defects Algorithm is used to enable the system to detect hand gesture without any additional hardware. …”
    Get full text
    Get full text
    Book Section
  13. 13
  14. 14
  15. 15

    Segmentation of Retinal Vasculature using Active Contour Models (Snakes) by Pang, Kee Y ong

    Published 2009
    “…Active contour model (snake) that based on level sets, techniques of curve evolution, and Mumford-Shah functional for segmentation is then used to segment out the detected retinal vessel and produce a complete retinal vasculature. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation by Noor Zaihan, Jamal

    Published 2019
    “…The overall protection coordination is thus very complicated and could not be satisfied using the conventional method moreover for the modern distribution system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of Sense and Avoid system based on multi sensor integration for unmanned vehicle system by Legowo, Ari, Ramli, M. Faiz, Syafiq Shamsudin, Syariful

    Published 2016
    “…Dissimilar kind of sensors which is optical and laser type is proposed to be employed, so that weaknesses from each individual sensor can be tolerated. Proper logics or algorithm related to the fusion of output from each sensor will also be studied.The combination of Extended Kalman Filter (EKF) and Differential Evolution(DE) method is used for the purpose of development of detection and tracking system which considered to be the main challenges in SAA system development. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Performance comparison of various YOLO architectures on object detection of UAV images by Gunawan, Teddy Surya, Mahmoud Ismail, Islam Mohamed, Kartiwi, Mira, Ismail, Nanang

    Published 2022
    “…The culmination of the evolution of computer vision technology is the development of sophisticated algorithms centered on extensive training and testing datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Enhanced image segmentation in thermal infrared image processing for faulty detection on broadcasting equipment / Mohd Rizman Sultan Mohd, Sukreen Hana Herman and Zaiton Sharif by Mohd, Mohd Rizman Sultan, Herman, Sukreen Hana, Sharif, Zaiton

    Published 2018
    “…The data gathered from the system will undergo enhanced image segmentation method using k-means clustering with the implementation of histogram equalization for further image processing algorithm to detect the presence of hot spot. …”
    Get full text
    Get full text
    Get full text
    Article