Search Results - (( using optimization method algorithm ) OR ( knowledge detection using algorithm ))
Search alternatives:
- knowledge detection »
- method algorithm »
- using algorithm »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
4
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Early detection of dengue disease using extreme learning machine
Published 2018“…This study will use the Extreme Learning Machine (ELM) method to classify the dengue by using the clinical data so that first aid can be given which can decrease some death risk. …”
Get full text
Get full text
Article -
6
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
Get full text
Get full text
Thesis -
7
-
8
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
Get full text
Get full text
Get full text
Thesis -
9
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
10
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
11
Test case minimization applying firefly algorithm
Published 2018“…The proposed test case minimization method has the following steps: provide weight to the paths, calculate path coverage for each path, transform an immediate graph into an adjacency matrix, which later is used to apply firefly algorithm and generate optimal test cases. …”
Get full text
Get full text
Get full text
Article -
12
Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network
Published 2009“…Experimentally observed responses were used to train, map and optimize the network algorithms before the best architecture was selected. …”
Get full text
Get full text
Article -
13
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Detailed method to identify the gut mycobiome in colorectal cancer patients using ITS-specific amplicon sequencing. …”
Get full text
Get full text
Get full text
Article -
14
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
15
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
16
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
17
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
Get full text
Get full text
Get full text
Article -
18
Robust techniques for linear regression with multicollinearity and outliers
Published 2016“…The ordinary least squares (OLS) method is the most commonly used method in multiple linear regression model due to its optimal properties and ease of computation. …”
Get full text
Get full text
Thesis -
19
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…Results showed that the filter parameters selection could significantly affect the amplitude of the sEMG as well as it may conceal the exact onset/offset time of the signal. The developed algorithm for the crosstalk recordings detection shows ability in determining the presence of the overlapped measurements period. …”
Get full text
Get full text
Thesis -
20
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers
