Search Results - candidate ((function algorithm) OR (detection algorithm))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
    Get full text
    Thesis
  2. 2

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An effective source number enumeration approach based on SEMD by Ge, Shengguo, Mohd Rum, Siti Nurulain, Ibrahim, Hamidah, Marsilah, Erzam, Perumal, Thinagaran

    Published 2022
    “…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
    Get full text
    Get full text
    Article
  5. 5

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…In addition, 10 gasses are detected with zero values for both the entropy and the chi- square test, and these gasses are the strongest candidates to detect and classify odours. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain by Paidi, Zulfikri, Muhd Zain, Nurzaid

    Published 2016
    “…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Defining fitness function for search based assessment of grammar reachability by Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty, Abdullah @ Selimun, Mohd Taufik

    Published 2018
    “…The reformulation efforts could be extended by reformulating such problems as Search Based CFG reachability problems, addressable using search algorithms, such as Evolutionary Programming (EP). However, this calls for the need of fitness function that can assess reachability attained by candidates during search process. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah by Mat Jusoh, Rizal, Hamzah, Norhazimi

    Published 2010
    “…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Informative top-k class associative rule for cancer biomarker discovery on microarray data by Ong, Huey Fang, Mustapha, Norwati, Hamdan, Hazlina, Rosli, Rozita, Mustapha, Aida

    Published 2020
    “…This paper proposes an informative top-k class associative rule (iTCAR) method in an integrative framework for identifying candidate genes of specific cancers. iTCAR introduces an enhanced associative classification algorithm that integrates microarray data with biological information from gene ontology, KEGG pathways, and protein-protein interactions to generate informative class associative rules. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Informative top-k class associative rule for cancer biomarker discovery on microarray data by Ong, Huey Fang, Mustapha, Norwati, Hamdan, Hazlina, Rosli, Rozita, Mustapha, Aida

    Published 2020
    “…This paper proposes an informative top-k class associative rule ( i TCAR) method in an integrative framework for identifying candidate genes of specific cancers. i TCAR introduces an enhanced associative classification algorithm that integrates microarray data with biological informa- tion from gene ontology, KEGG pathways, and protein-protein interactions to generate informative class associative rules. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin by Ahmad, Khairul Azman, Mohd Noor, Mohd Halim, Mohamad Idin, Mohamad Adha

    Published 2011
    “…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    Comparison and analysis study of sha-3 finallists by Taha, Imad, Alahmad, Mohammad, Munther, Khansaa

    Published 2012
    “…Therefore, this paper addresses a comparative study of round 2 finalist SHA-3 candidates in; design of structure, complexity of security, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    White Hole-Black Hole Algorithm by Suad Khairi, Mohammed, Zuwairie, Ibrahim, Hamdan, Daniyal, Nor Azlina, Ab. Aziz

    Published 2016
    “…The white hole-black hole algorithm (WH-BH) starts with an initial population of candidate solutions to an optimization problem and an objective function that is calculated for them. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article