Search Results - adoption using different selection algorithm*

Search alternatives:

Refine Results
  1. 1

    An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis by Tie, K. H., A., Senawi, Chuan, Z. L.

    Published 2022
    “…When the Gaussian mixture distribution algorithm is adopted, none of the criteria can consistently select features with the least number. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Zebra optimization algorithm for feature selection by Faizan, Muhammad, Muhammad Arif, Mohamad

    Published 2026
    “…In this paper, we proposed the use of Zebra Optimization Algorithm (ZOA) for handling task regarding feature selection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Review of Nature Inspired Metaheuristic Algorithm Selection for Combinatorial t-way Testing by Muazu, A.A., Hashim, A.S., Sarlan, A.

    Published 2022
    “…However, not all metaheuristics are effectively adopted in combinatorial t-way testing, some proved to be effective and thus have been popular tools selected for optimization whilst others are not adopted. …”
    Get full text
    Get full text
    Article
  4. 4

    Multi-criteria acces selection mechanism based on user preferences in heterogeneous wireless networks by Xiaoxue, Guo

    Published 2023
    “…At present, the access selection technology mainly adopts single and common network performance parameter as access selection criteria, ignoring the user preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Performance evaluation of intrusion detection system using selected features and machine learning classifiers by Raja Mahmood, Raja Azlina, Abdi, AmirHossien, Hussin, Masnida

    Published 2021
    “…In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…The selected feature subset using ant system is then validated using support vector machine. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…The algorithms are used to generate test cases for nine different Boolean expressions of different size and complexities. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Determination of tree stem volume : A case study of Cinnamomum by Noraini Abdullah

    Published 2013
    “…A data transformation approach is introduced, based on the different data characteristics using the maximum coefficient of determination (R2) and maximum p-value approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. The BFGS quasi-Newton (TRAINBFG) and Levenberg-Marquart (TRAINLV) have been adopted as training algorithms of the neural network model. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of deep learning based user-friendly interface for fruit quality detection by Mohd Ali, Maimunah, Hashim, Norhashila

    Published 2024
    “…To overcome this issue, a deep learning approach using convolutional neural network was used to evaluate the fruit quality. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    The interrelations between artificial intelligence (AI) usage and academic performance by Chin, Wie Jane

    Published 2024
    “…Six different uses of AI, routine use, regular use, efficient use, extended use, innovative use and reinformed use, were selected to look into their effect on students’ academic performance. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Weather forecasting using artificial neural network by Wong, Wei Keat

    Published 2014
    “…In this study, Kuching city been selected as the study area. The Kuching meteorology data used in this study is collected from the Malaysian Meteorological Department. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…The learned network was used to acquire the weights of the criteria. The optimum structure of the proposed network was selected using 600,000 use cases. …”
    Get full text
    Get full text
    Thesis