Search Results - candidate ((optimization algorithm) OR (detection algorithm))

Refine Results
  1. 1
  2. 2

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The results demonstrated that the proposed method could generate an optimal collision-free path. Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
    Get full text
    Thesis
  5. 5

    Dingle's Model-based EEG Peak Detection using a Rule-based Classifier by Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2015
    “…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network by Adam, A., Ibrahim, Z., Mokhtar, N., Shapiai, M.I., Mubin, M.

    Published 2016
    “…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
    Get full text
    Get full text
    Article
  8. 8

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The algorithms were examined on two real datasets, namely, NSL-KDD and Landsat. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network by Asrul, Adam, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai, Marizan, Mubin

    Published 2016
    “…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Breast Cancer Prediction Model Using Machine Learning by Muhammad Amin, Bakri, Inna, Ekawati

    Published 2021
    “…Breast cancer requires early detection, hence it can be prevented earlier or treated more optimally. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Intelligent surveillance system for street surveillance by Mohd Mustafah, Yasir, Zainuddin, Nor Afiqah, Rashidan, Mohammad Ariff, Abdul Aziz, Nor Nadirah, Saripan, M. Iqbal

    Published 2017
    “…For the tracking algorithm, the effectiveness between colour, edge and texture features for target and candidate blobs were analysed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Intelligent surveillance system for street surveillance by Mohd. Mustafah, Yasir, Zainuddin, Nor Afiqah, Rashidan, Mohammad Ariff, Abdul Aziz, Noraini N., Saripan, M. Iqbal

    Published 2017
    “…For the tracking algorithm, the effectiveness between colour, edge and texture features for target and candidate blobs were analysed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain by Paidi, Zulfikri, Muhd Zain, Nurzaid

    Published 2016
    “…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah by Mat Jusoh, Rizal, Hamzah, Norhazimi

    Published 2010
    “…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
    Get full text
    Get full text
    Research Reports
  20. 20