Search Results - (( data optimization method algorithm ) OR ( parameter detection a algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The process of selecting the least number of features without any effect on the result accuracy in FSS was considered a multi-objective optimization problem. The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  5. 5

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…In these experiments, it was demonstrated that the FLN optimization method achieved 0.9964 which is a higher accuracy than most of the existing paradigms for classifying network intrusion detection data.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm by Nik Ahmad Farihin, Mohd Zulkifli, Zuriani, Mustaffa, Mohd Herwan, Sulaiman

    Published 2025
    “…Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…In this task, two neural network algorithms, Recurrent Neural Networks (RNN) and Multi-Layer Perceptron Neural Networks (MLP-NN) were used and the hyper-parameters of the network architecture was optimized based on a systematic grid search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A buffer-based online clustering for evolving data stream by Islam, Md. Kamrul, Ahmed, Md. Manjur, Kamal Z., Zamli

    Published 2019
    “…Recently, a fully online clustering algorithm for evolving data stream called CEDAS was proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Kinetic parameters estimation of the Escherichia coli (E. coli) model by Garra Rufa-inspired Optimization Algorithm (GRO) by Jasni, Mohamad Zain, Azrag, Mohammed Adam Kunna, Saiful Farik, Mat Yatin, Aldehim, Ghadah, Zuhaira, Muhammad Zain, Shaiba, Hadil, Alturki, Nazik, Sapiah, Sakri, Azlinah, Mohamed, Jaber, Aqeel S.

    Published 2024
    “…So, Garra Rufa-inspired Optimization (GRO) Algorithm is applied to the primary metabolic network of E. coli as a model to estimate small-scale kinetic parameters and increase the kinetic accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Adaptive Fast Orthogonal Search (FOS) algorithm for forecasting streamflow by Osman A., Afan H.A., Allawi M.F., Jaafar O., Noureldin A., Hamzah F.M., Ahmed A.N., El-shafie A.

    Published 2023
    “…Data handling; Forecasting; Nonlinear systems; Regression analysis; Religious buildings; Rivers; Stochastic systems; Stream flow; Fast orthogonal searches; Forecasting accuracy; Forecasting models; High dams; Optimization modeling; Optimization scheme; Pole zero cancellation; Streamflow forecasting; Stochastic models; algorithm; artificial intelligence; hydrological modeling; identification method; optimization; river basin; streamflow; Aswan Dam; Nile River…”
    Article
  19. 19

    Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification by Mohammed, Alhassan Afnan

    Published 2022
    “…However, finding the most appropriate deep learning algorithm for a medical classification problem along with its optimal parameters becomes a difficult task. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
    Get full text
    Get full text
    Article