Search Results - (( course evaluation ((path algorithm) OR (search algorithm)) ) OR ( _ detection based algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems by Joe Henry Obit, Rayner Alfred, Mansour Hassani Abdalla

    Published 2017
    “…The performances of the proposed cooperative hyper-heuristics are evaluated using the standard course timetabling benchmark problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Evaluation of genetic algorithm based solar tracking system for photovoltaic panels by Mashohor, Syamsiah, Samsudin, Khairulmizam, M. Noor, Amirullah, A. Rahman, Adi Razlan

    Published 2008
    “…In this paper, a genetic algorithm (GA) has been proposed utilizing sun tracking approaches to maximize the performance of PV panels. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Enhanced simulated annealing for solving aggregate production planning by Abu Bakar, Mohd Rizam, Bakheet, Abdul Jabbar Khudhur, Kamil, Farah, Kalaf, Atiya, Abbas, Iraq T., Lee, Lai Soon

    Published 2016
    “…Since this algorithm works sequentially then the current state will generate only one in next state that will make the search slower and the drawback is that the search may fall in local minimum which represents the best solution in only part of the solution space. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    Determination of permeability characteristics of solid/liquid separation using simplex algorithm by Tanaka, Takanori, Kato, Hiroki, Fukuyama, Ryo, Hayashi, Natsuko, Jami, Mohammed Saedi, Iwata, Masashi

    Published 2013
    “…(iii) The optimum values of α1 and  are searched by fitting theoretical time course of constant-pressure expression with experimental expression data by algorithm of simplex method. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…This algorithm is based on two detection schemes; namely active and passive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework by Abal Abas, Zuraida, Mohd Zaki, Nurul Hafizah, Asmai, Siti Azirah, Abdul Rahman, Ahmad Fadzli Nizam, Zainal Abidin, Zaheera

    Published 2019
    “…The proposed framework utilizes the Cross-Time approach for enhancing temporal community detection algorithm. The expected result shows that the Enhanced Temporal Community Detection Algorithm based on Cross Time approach for higher visibility in supply chain network is the major finding when implementing this proposed framework. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection by Edris, Khalid Edris, Fakhreldin, Mohammed Adam Ibrahim, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2014
    “…In this paper, we propose Edge Adaptive Steganalysis algorithm based on histograms of the absolute difference of adjacent pixels to detect EALMR. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article