Search Results - (( using solution using algorithm ) OR ( using (vectorisation OR victimization) based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Additionally, the results of the study indicated that the prediction model for workload performance evaluation using CBR that is optimized with Hash Search technique for determining workload data on Shortest Path analysis via the employment of Dijkstra algorithm can be useful for the prediction of incoming workload based on the status of the DBMS parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…Usually, phishing websites are created resembling legitimate sources to deceive victims. To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    An Automated System For Classifying Conference Papers by Ngan, Seon Choon Han

    Published 2021
    “…The best classification model was then deployed to a web-based research conference system. The web-based system was developed using the Django web framework, based on a system architecture defined in this project called the Enhanced 3-Tier Web-based System with a Data Mining Layer. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    The swarm-based exploration algorithm with expanded circle pattern for searching activities by Zuhri, Muhammad Fuad Reza, Zahari, Ammar, Desia, Recky, Ismail , Amelia Ritahani, Al Haek, Mohammed

    Published 2015
    “…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Solving transcendental equation using genetic algorithm / Masitah Hambari by Masitah , Hambari

    Published 2004
    “…Genetic Algorithm is used to find the roots or set of optimal solution that satisfy the equation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Overview of metaheuristic: classification of population and trajectory by Zainul Rashid, Zarina

    Published 2010
    “…Algorithms are used to find the solutions through the computer program. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimal power flow using the Jaya algorithm by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2016
    “…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. The optimal solution obtained by the Jaya algorithm is compared with different stochastic algorithms, and demonstrably outperforms them in terms of solution optimality and solution feasibility, proving its effectiveness and potential. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of a fall detection system based on neural network featuring IoT-Technology by Nik Anwar, Nik Syahrim, Ng, Yong Jie, Ng, Wei Yu, Law, Cheng Quan

    Published 2021
    “…A body temperature and heartpulse monitoring device were developed for this system to provide the medical personnel additional information on the body condition of the fall victim. Using the latest IoT-technology, the system can be connected to the internet and provides a continuous and real-time monitoring capability. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Improving Vector Evaluated Particle Swarm Optimisation by Incorporating Nondominated Solutions by Kian, Sheng Lim, Zuwairie, Ibrahim, Salinda, Buyamin, Anita, Ahmad, Faradila, Naim, Kamarul Hawari, Ghazali, Norrima, Mokhtar

    Published 2013
    “…This algorithm optimises one objective using a swarm of particles where their movements are guided by the best solution found by another swarm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    An algorithm for positive solution of boundary value problems of nonlinear fractional differential equations by Adomian decomposition method by A. I., Md. Ismail, Hytham. A., Alkresheh

    Published 2016
    “…In the proposed algorithm the boundary conditions are used to convert the nonlinear fractional differential equations to an equivalent integral equation and then a recursion scheme is used to obtain the analytical solution components without the use of undetermined coefficients. …”
    Get full text
    Get full text
    Get full text
    Article