Search Results - (( _ evaluation system algorithm ) OR ( case detection based algorithm ))

Refine Results
  1. 1

    Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor by Mohd Shukor, Fatin Azirah

    Published 2022
    “…In order to gain feasible economic return, failure detection (FD) mechanisms are given utmost attention to monitor the performance and yet able to detect fault occurrence of the operating GCPV system especially in the form of analysis algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  3. 3

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Flock optimization algorithm-based deep learning model for diabetic disease detection improvement by Balasubramaniyan, Divager, Husin, Nor Azura, Mustapha, Norwati, Mohd Sharef, Nurfadhlina, Mohd Aris, Teh Noranis

    Published 2024
    “…Hence, the research objective is to create an improved diabetic disease detection system using a Flock Optimization Algorithm-Based Deep Learning Model (FOADLM) feature modeling approach that leverages the PIMA Indian dataset to predict and classify diabetic disease cases. …”
    Get full text
    Get full text
    Article
  5. 5

    Cyclostationarity-based spectrum sensing for analog TV and wireless microphone signals by V., Jeoti, A.M., Mossa

    Published 2009
    “…These algorithms are evaluated in comparison with energy detector. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…The data collected was used to train the Multilayer Feedforward Neural Network (MLFNN) with Back-propagation (BP) algorithm. This MLFNN with BP algorithm was simulated using MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    A Hybrid Sine Cosine Algorithm with Cluster Voting for Combinatorial Testing by MAT REJAB, MAZIDAH

    Published 2025
    “…ombinatorial testing is essential for detecting system faults with minimal test cases. However, traditional methods often struggle to efficiently explore large search spaces, leading to redundant test cases and increased computational costs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Evaluating Bees Algorithm for Sequence-based T-way Testing Test Data Generation by M. H., Mohamed Zabil, Kamal Z., Zamli, K. C., Lim

    Published 2018
    “…However, very few strategies have been proposed for sequence-based t-way. This paper presents statistical analysis on the performance of Bees Algorithm against the other sequence t-way strategies, in order to generate test cases.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A wheelchair sitting posture detection system using pressure sensors by Mohamad Yusoff, Muhammad Annuar Alhadi, Azmi, Nur Liyana, Nordin, Nor Hidayati Diyana

    Published 2024
    “…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system by Tiong, Meng Chung

    Published 2021
    “…In addition, with the continuous improvement effort and the possibility of a new-comer algorithm can show superior results on the current problem, a new MFO based MPPT algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Exploration and Exploitation Mechanism in Pairwise Test Case Generation: A Systematic Literature Review by Yahaya, Muhammad Sabo, Hashim, Ahmad Sobri B., Oluwagbemiga Balogun, Abdullateef, Aminu Muazu, Aminu, Sabo Usman, Fatima, Adamu Aliyu, Dahiru, Uwaisu Muhammad, Abdullahi

    Published 2025
    “…Covering research from 2014 to 2024, the review evaluates hybrid and metaheuristic strategies, including Pairwise Migrating Birds Optimization-Based Strategies (PMBOS), Pairwise Gravitational Search Algorithm Strategy (PGSAS), Pairwise hybrid Artificial Bee Colony (PhABC), Genetic and Particle Swarm Optimization (GAPSO) algorithm, Hybrid Optimization Algorithm (HOA), and Parameter Free Choice Function based Hyper-Heuristic (PCFHH), among others. …”
    Get full text
    Get full text
    Article
  13. 13

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…Ultimately, the sorting algorithm performance came to be evaluated by support vector machine algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…The confusion matrix determines the system’s effectiveness, which includes evaluation criteria such as accuracy, precision, detection rate, F1-score, and false alarm rate (FAR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…Simulation results show that the proposed PF-SUS-SIR clustering algorithm significantly improves user fairness with at least 38.96% over conventional SUS-SIR clustering algorithm while maintaining the total system throughput (near maximum). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Firefly combinatorial testing strategy by Alsewari, Abdulrahman A., Kamal Z., Zamli, Lin, Mee Xuan

    Published 2019
    “…This paper propose FA to be applied in solving combinatorial testing problem by implementing a Firefly Algorithm based Test Suite Generator (FATG). Combinatorial testing is an effective method to generate a test list to detect the defects may introduce due the interaction between the systems interfaces. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Multi-method diagnosis of CT images for rapid detection of intracranial hemorrhages based on deep and hybrid learning by Mohammed, Badiea Abdulkarem, Senan, Ebrahim Mohammed, Al-Mekhlafi, Zeyad Ghaleb, Rassem, Taha Hussein, Makbol, Nasrin M., Alanazi, Adwan Alownie, Almurayziq, Tariq S., Ghaleb, Fuad A., Sallam, Amer A.

    Published 2022
    “…The third proposed system uses artificial neural networks (ANNs) based on the features of the GoogLeNet, ResNet-50 and AlexNet models, whose dimensions are reduced by a principal component analysis (PCA) algorithm, and then the low-dimensional features are combined with the features of the GLCM and LBP algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Scalability and performance in duplicate detection : relational vs. graph database by Muhammad Farhad, Khaharruddin

    Published 2023
    “…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
    Get full text
    Get full text
    Undergraduates Project Papers