Search Results - ((((restoration algorithm) OR (evolutionary algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  3. 3

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Study of fuzzy based control algorithm for dynamic voltage restorer by Taghizadeh S., Tan N.M.L., Karimi-Ghartemani M.

    Published 2023
    “…Algorithms; Control systems; Damage detection; Power quality; Voltage regulators; Voltage stabilizing circuits; Battery lifetime; DVR; Dynamic voltage restorer (DVR); Electrical components; EPLL; Improved control algorithms; Phase lock loop (PLL); Sensitive loads; Fuzzy logic…”
    Article
  6. 6

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…In this paper the result of an attempt to develop a substitute nonlinear model based on multilayer neural network (MLNN) and evolutionary algorithm (EA) for a single-shaft gas turbine having IGVs and VSVs is presented. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Partitioning detection and connectivity restoration algorithm for WSAN by Muhammad, Imran, Md Said, Abas, Hasbullah, Halabi, Younis, Mohammed

    Published 2010
    “…This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mitigation of voltage sags/swells using dynamic voltage restorer based on DQO algorithm / Mohamad Shahrun Azizan by Azizan, Mohamad Shahrun

    Published 2009
    “…Voltage swells is a sudden increasing of supply voltage in rms voltage at network fundamental frequency cause by energizing large capacitor or switching off a large inductive load. A dynamic voltage restore based on the dqo algorithm is discussed. The control scheme is very effective to detect any disturbance in low voltage distribution systems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Restoration of missing data in old archives based on genetic algorithm by Khammar, Mohammad Reza, Saripan, M. Iqbal, Marhaban, Mohammad Hamiruce, Ishak, Asnor Juraiza, Zolfaghari, Fateme

    Published 2014
    “…After applying most algorithms to detect the position of blotches and also scratch which is another type of defect in the old media, in each frame of video, it is essential to correct them, in other words, we should fill the missing data with reasonable values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…This post processing algorithm was provided based on a multi-level scanning and shape analysis which was presented for the better performance of high correct detection and lower false alarms for each given threshold. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency by Bello, AbdulKarim, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Zulzalil, Hazura

    Published 2018
    “…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. In this work, we proposed an evolutionary cost-cognizant regression testing approach that prioritizes test case according to the rate of severity detection of test cases connected with dependent faults using genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works by Gorment N.Z., Selamat A., Krejcar O.

    Published 2023
    “…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
    Conference Paper
  19. 19

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
    Get full text
    Get full text
    Conference or Workshop Item