Search Results - (((solutionary OR evolutionary) OR (solutionary OR evolutionary)) OR solution) detection technique

Search alternatives:

Refine Results
  1. 1
  2. 2

    Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects by Zuwairie, Ibrahim, Tan, Shing Chiang, Watada, Junzo, Marzuki, Khalid

    Published 2014
    “…Such a situation leads to an imbalanced data set problem, wherein it engenders a great challenge to deal with by applying machine-learning techniques for obtaining effective solution. In addition, the database may comprise overlapping samples of different classes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…In recent years, detection methods based on machine learning techniques are widely deployed in order to improve the efficiency of anomaly-based detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A new islanding detection technique based on passive parameter using artificial neural network evolutionary programing / Aimie Nadia Ab Salam by Ab Salam, Aimie Nadia

    Published 2019
    “…The objective of this thesis is to design a new islanding detection technique for synchronous type of DG based on the most sensitive passive parameters by using Artificial Neural Network (ANN) Evolutionary Programming (EP). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency by Bello, AbdulKarim, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Zulzalil, Hazura

    Published 2018
    “…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. In this work, we proposed an evolutionary cost-cognizant regression testing approach that prioritizes test case according to the rate of severity detection of test cases connected with dependent faults using genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation by Illias, Hazlee Azil, Wee, Zhao Liang

    Published 2018
    “…Thus, the proposed technique can be one of the potential solutions to identify the transformer fault type based on DGA data on site.…”
    Get full text
    Get full text
    Article
  8. 8

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…To enhance the efficiency of anomaly-based detection in terms of accuracy of classification, in this paper, the evolutionary kernel neural network random weight is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The proposed technique is named Evolutionary Cost-Cognizant Regression Test Case Prioritization (ECRTP). …”
    Get full text
    Get full text
    Thesis
  10. 10

    A new islanding detection technique based on passive parameter using a combination of artificial neural network and evolutionary programming algorithm / Hasmaini Mohamad …[et al.] by Mohamad, Hasmaini, Ab Salam, Aimie Nadia, Md Razali, Norhasniza, Salim, Nur Ashida, Mat Yasin, Zuhaila

    Published 2021
    “…This paper presents the development of a new islanding detection technique for a synchronous-type DG based on the most sensitive passive parameters using the Artificial Neural Network (ANN)-Evolutionary Programming (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    On the automation of vulnerabilities fixing for web application by Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia, Abdullah @ Selimun, Mohd Taufik

    Published 2014
    “…The research community have devoted considerable amount of efforts to address this problem by proposing many techniques for automated vulnerabilities detection and fix generation for web application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap by Noor Shah Rizal, Abdul Manap

    Published 2018
    “…In the distribution system, the protection relay is one of the equipment in the system that can detect from any abnormal activity and protect the area under its observation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm by Mohd. Zin, Zalhan

    Published 2007
    “…A wide variety of face detection techniques have been proposed over the past decades. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…Instead of get random value of position, ACO helps to optimize the nearest marble. Collision detection technique is one of a physic law that manipulate the movement and position of marble. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Various face detection techniques has been proposed over the past decade. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Bio-inspired for Features Optimization and Malware Detection by Mohd Faizal, Ab Razak, Nor Badrul, Anuar, Fazidah, Othman, Ahmad, Firdaus, Firdaus, Afifi, Rosli, Salleh

    Published 2018
    “…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Research Book - data engineering and information security series 1

    Published 2017
    “…Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. …”
    Get full text
    Get full text
    Book