Search Results - a ((reflection algorithm) OR (((selection algorithm) OR (detection algorithm))))

Refine Results
  1. 1

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…The standard DE algorithm is known as a fixed length optimizer, while our problem demands the need for methods that aren’t tolerated to a fixed individual size, and that was made by altering the mutation and crossover strategies as well as the selection operation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Air quality measurement using remote sensing and digital images processing techniques / Lim, H. S. … [et al.] by Lim, H. S., Jafri, Mat, Abdullah, M. Z., Ahmad, A.N.

    Published 2004
    “…A new algorithm was developed for detecting air pollution from the digital camera images chosen based on the highest correlation coefficient, R and lowest root mean square error, RMS for PM10. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Danger theory inspired artificial immune system for pattern recognition by Chung Seng Kheau, Rayner Alfred, Lau, Hui Keng, Jason Teo, Mohd. Hanafi Ahmad Hijazi, Nurul'alam Mohd. Yaakub

    Published 2007
    “…Negative Selection (NS) algorithm is the most commonly researched algorithm within the AIS framework. …”
    Get full text
    Get full text
    Research Report
  5. 5

    Application of deep convolutional neural network for automated detection of myocardial infarction using ECG signals by Acharya, U.R., Fujita, H., Oh, S.L., Hagiwara, Y., Tan, J.H., Adam, M.

    Published 2017
    “…In this study, we implemented a convolutional neural network (CNN) algorithm for the automated detection of a normal and MI ECG beats (with noise and without noise). …”
    Get full text
    Get full text
    Article
  6. 6

    Retrieval Of Environmental Parameters Over Water Areas Using MODIS Data by Amin, Abd Rahman Mat

    Published 2012
    “…The presences of cirrus cloud have been detected utilizing gradient technique algorithm. The algorithm is based on the gradient connecting the 1.38 and 1.24 μm lines of the log– log graph of apparent reflectance against the MODIS wavelength. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article
  8. 8

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Modified Binary Grey Wolf Optimiser (MBGWO) is a modern metaheuristic algorithm that has successfully been used for FS for anomaly detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Benthic habitat mapping and coral bleaching detection using quickbird imagery and Kd algorithm by Kabiri, Keivan

    Published 2013
    “…Afterwards, NASA-kd 490 algorithm was modified and then applied to determine kd 490 in each pixel of image. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi, Al-Habshi, Mohammed Mustafa

    Published 2025
    “…Objectives: The main objective of the study is to classify the severity level of FLS disease in soybean using hyperspectral reflectance data and machine learning algorithms. Materials and Methods: We used hyperspectral reflectance data from healthy and FLS of soybeans. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Maze Mouse by Abdul Rahim, Asmalilah

    Published 2004
    “…The first block is the sensory systems which generate the input to the microcontroller systems. The selected sensor is the IR detector that uses the reflective motion in order to detect the mouse position. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Among these selected test cases, the algorithm identifies the redundant test cases based on definition occurrence, if they cover a similar combination of branch coverage except in one branch and also if the test cases cover a similar definition occurrence . …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hydraulic characterization of PVC-O pipes by means of transient tests by Ghazali, M. F., Nizwan, Che Ku Eddy, Ismail, Nurazima, Sani, M. S.M., Yusof, Mohd Fadhlan M., Mohamed, Zamri

    Published 2019
    “…These IMFs that where being displayed by using a mathematical algorithm, that is known as Hilbert Transform (HT) spectrum. …”
    Get full text
    Get full text
    Research Report
  18. 18

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm by Zuwairie, Ibrahim, Mohd Zaidi, Mohd Tumari, Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Mohd Ibrahim, Shapiai

    Published 2014
    “…This study focuses on using GSA method, a new computational intelligence algorithm. Moreover, a rule-based classifier is employed to distinguish a peak point based on the selected features. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article