Search Results - candidate ((((replication algorithm) OR (evolution algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Differential evolution for urban transit routing problem by Buba, Ahmed Tarajo, Lai, Soon Lee

    Published 2016
    “…With this in mind, we propose a differential evolution (DE) algorithm for solving the UTRP with a specific objective of minimizing the average travel time of all served passengers. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain by Paidi, Zulfikri, Muhd Zain, Nurzaid

    Published 2016
    “…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Crossover-first differential evolution for improved global optimization in non-uniform search landscapes by Teo, Jason Tze Wi, Mohd Hanafi Ahmad Hijazi, Hui, Keng Lau, Salmah Fattah, Aslina Baharum

    Published 2015
    “…The DE algorithm generates new candidate solutions by first conducting the mutation operation which is then followed by the crossover operation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Hybrid differential evolution-particle swarm optimization algorithm for multi objective urban transit network design problem with homogeneous buses by Tarajo, Buba Ahmed, Lee, Lai Soon

    Published 2019
    “…This paper proposes a hybrid differential evolution with particle swarm optimization (DE-PSO) algorithm to solve the UTNDP, aiming to simultaneously optimize route configuration and service frequency with specific objectives in minimizing both the passengers’ and operators’ costs. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah by Mat Jusoh, Rizal, Hamzah, Norhazimi

    Published 2010
    “…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
    Get full text
    Get full text
    Research Reports
  9. 9
  10. 10

    Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin by Ahmad, Khairul Azman, Mohd Noor, Mohd Halim, Mohamad Idin, Mohamad Adha

    Published 2011
    “…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhanced handover mechanism in long term evolution (LTE) networks by Hussein, Yaseein Soubhi, Mohd Ali, Borhanuddin, Varahram, Pooria, Sali, Aduwati

    Published 2011
    “…This paper investigates the improvement steps for HO mechanisms in long term evolution (LTE) system which is being formally submitted as a candidate 4G system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…To evaluate the PMT’s performance and adaptability, the PMT was applied to four contemporary metaheuristic algorithms, Differential Evolution, Particle Swarm Optimization, Simulated Annealing, and Whale Optimization Algorithm, to solve 15 well-known benchmark functions as well as 2 real world problems based on the welded beam design and pressure vessel design. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…Using data obtained from one of the leading telecommunication companies in Malaysia, we show that the proposed algorithm has successfully not only detected fraud calls as suspected by the company, but also to identify suspicious calls which can be candidates of fraud call. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    PMT: opposition-based learning technique for enhancing meta-heuristic performance by Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…To evaluate the PMT's performance and adaptability, the PMT has been applied to four contemporary meta-heuristic algorithms, differential evolution (DE), particle swarm optimization (PSO), simulated annealing (SA), and whale optimization algorithm (WOA), to solve 15 well-known benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Integrated face and facial components detection by Ho, Lip Chin, Hanafi, Marsyita, Salka, Tanko Danial

    Published 2015
    “…The system detects face, nose and mouth using three different classifiers, which were created based on the Viola-Jones method [1] and the eyes were detected using an Eye Detection method that consists of resolution reduction, identification of the eye candidates using eye filter [2] and eyes localization based on mean comparison. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20