Search Results - candidate ((((section algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
    Get full text
    Get full text
    Book Section
  2. 2

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
    Get full text
    Thesis
  3. 3

    Improved fault location on distribution network based on multiple measurements of voltage sags pattern by Awalin, L.J., Mokhlis, Hazlie, Halim, A.H.A.

    Published 2012
    “…A new ranking approach is proposed to overcome multiple faulted section candidates. A large scale 11 kV network which comprises of 43 nodes and 5 branches are used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An effective source number enumeration approach based on SEMD by Ge, Shengguo, Mohd Rum, Siti Nurulain, Ibrahim, Hamidah, Marsilah, Erzam, Perumal, Thinagaran

    Published 2022
    “…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
    Get full text
    Get full text
    Article
  7. 7

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…In addition, 10 gasses are detected with zero values for both the entropy and the chi- square test, and these gasses are the strongest candidates to detect and classify odours. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain by Paidi, Zulfikri, Muhd Zain, Nurzaid

    Published 2016
    “…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Defining fitness function for search based assessment of grammar reachability by Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty, Abdullah @ Selimun, Mohd Taufik

    Published 2018
    “…The reformulation efforts could be extended by reformulating such problems as Search Based CFG reachability problems, addressable using search algorithms, such as Evolutionary Programming (EP). However, this calls for the need of fitness function that can assess reachability attained by candidates during search process. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah by Mat Jusoh, Rizal, Hamzah, Norhazimi

    Published 2010
    “…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    Informative top-k class associative rule for cancer biomarker discovery on microarray data by Ong, Huey Fang, Mustapha, Norwati, Hamdan, Hazlina, Rosli, Rozita, Mustapha, Aida

    Published 2020
    “…This paper proposes an informative top-k class associative rule (iTCAR) method in an integrative framework for identifying candidate genes of specific cancers. iTCAR introduces an enhanced associative classification algorithm that integrates microarray data with biological information from gene ontology, KEGG pathways, and protein-protein interactions to generate informative class associative rules. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Informative top-k class associative rule for cancer biomarker discovery on microarray data by Ong, Huey Fang, Mustapha, Norwati, Hamdan, Hazlina, Rosli, Rozita, Mustapha, Aida

    Published 2020
    “…This paper proposes an informative top-k class associative rule ( i TCAR) method in an integrative framework for identifying candidate genes of specific cancers. i TCAR introduces an enhanced associative classification algorithm that integrates microarray data with biological informa- tion from gene ontology, KEGG pathways, and protein-protein interactions to generate informative class associative rules. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin by Ahmad, Khairul Azman, Mohd Noor, Mohd Halim, Mohamad Idin, Mohamad Adha

    Published 2011
    “…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    Comparison and analysis study of sha-3 finallists by Taha, Imad, Alahmad, Mohammad, Munther, Khansaa

    Published 2012
    “…Therefore, this paper addresses a comparative study of round 2 finalist SHA-3 candidates in; design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper