Search Results - (( evolution optimization method algorithm ) OR ( features detection tree algorithm ))

Refine Results
  1. 1

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  2. 2

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  3. 3
  4. 4

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…This system the main features is to detect the crowns of oil palm tree by drawing circle on it and covers the feature of counting for every single detection that has been made as an evaluation to ensure the system is completely done. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    VEHICLE CLASSIFICATION FROM CCTV IMAGES AND VIDEOS by KAMARUDDIN, ERNA SHAFFIQA

    Published 2018
    “…This report shows a study on orientation robust vehicle classification for data analytics purposes by using (HOG) feature set. The study is conducted to analyse the performance of histograms of oriented gradient(HOG) between Linear SVM algorithm and Aggregated Channel Features (ACF) algorithm which is using Decision Trees. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Enhanced faster region-based convolutional neural network for oil palm tree detection by Liu, Xinni

    Published 2021
    “…Hence, this research aims to close the research gaps by exploring the deep learning-based object detection algorithm and the classical convolutional neural network (CNN) to build an automatic deep learning-based oil palm tree detection and counting framework. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…There are five (5) Classification techniques used such as Naive Bayes, K-NN, Decision Tree, Random Tree and Decision Stump. The result of Hybrid Feature accuracy using Rapidminer and Naive Bayes technique is 77.47%, for K-NN: 78.56%, Decision Tree: 57.16%, Random Tree: 57.24% and Decision Stump: 57.16%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…The proposed method is tested on 10 multi-objective benchmark problems of CEC 2009 and compared with four metaheuristics: Multi-Objective Grey Wolf Optimizer (MOGWO), Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), Multi-Objective Differential Evolution (MODE) and MOPSO. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Performance evaluation of intrusion detection system using selected features and machine learning classifiers by Raja Mahmood, Raja Azlina, Abdi, AmirHossien, Hussin, Masnida

    Published 2021
    “…Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. …”
    Get full text
    Get full text
    Article
  10. 10

    Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse) by Jia, Xing Yeoh, Chuii, Khim Chong, Mohd Saberi, Mohamad, Yee, Wen Choon, Lian, En Chai, Safaai, Deris, Zuwairie, Ibrahim

    Published 2015
    “…The hybrid of Differential Evolution algorithm with Kalman Filtering and Bacterial Foraging algorithm is a novel global optimisation method implemented to obtain the best kinetic parameter value. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
    Get full text
    Get full text
    Article
  12. 12

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…The results indicated that the Decision Tree and Random Forest algorithms provided the best detection accuracy at 96%, followed by the K-NN algorithm at 95%. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy by Kadhem, Athraa Ali, Abdul Wahab, Noor Izzri, Abdalla, Ahmed N.

    Published 2019
    “…This stuffy proposed a novel optimization method labeled the "Differential Evolution Optimization Algorithm" (DEOA) to assess the reliability of power generation systems (PGS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Multiobjective optimization of bioethanol production via hydrolysis using hopfield- enhanced differential evolution by Ganesan, T., Elamvazuthi, I., Shaari, K.Z.K., Vasant, P.

    Published 2014
    “…In this chapter, the weighted sum scalarization approach is used in conjunction with three meta-heuristic algorithms: Differential Evolution (DE), Hopfield-Enhanced Differential Evolution (HEDE), and Gravitational Search Algorithm (GSA). …”
    Get full text
    Get full text
    Book
  16. 16
  17. 17

    HEAT EXCHANGER NETWORK SYNTHESIS AND OPTIMIZATION BY PINCH ANALYSIS AND DIFFERENTIAL EVOLUTION METHOD by NGO , THI PHUONG THUY

    Published 2016
    “…This metadology way uses an algorithm which combines Pinch Design Method and Differential Evolution Method. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Comparative study of informative acoustic features for VTOL UAV faulty prediction using machine learning by Mohd Sani, Fareisya Zulaikha, Makhtar, Siti Noormiza, Mohd Nor, Elya, Kamarudin, Nur Diyana, Md Ali, Syaril Azrad, Md Ali, Kurnianingsih

    Published 2025
    “…Among the three features, pitch produced the highest accuracy with 78.75% of training and 77.50% of testing using the Medium Tree algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Detection and classification of conflict flows in SDN using machine learning algorithms by Mutaz Hamed Hussien Khairi, Sharifah Hafizah Syed Ariffin, Nurul Mu'azzah Abdul Latiff, Kamaludin Mohamad Yusof, Mohamed Khalafalla Hassan, Fahad Taha Al-Dhief, Mosab Hamda, Suleman Khan, Muzaffar Hamzah

    Published 2021
    “…As a result, this paper presents several machine learning algorithms that include Decision Tree (DT), Support Vector Machine (SVM), Extremely Fast Decision Tree (EFDT) and Hybrid (DT-SVM) for detecting and classifying conflicting flows in SDNs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The study assesses the effectiveness of several algorithms, including Naïve Bayes, Support Vector Machine (SVM), KNearest Neighbor (KNN), Decision Tree, Random Forest, and Logistic Regression, through an examination of a publicly accessible dataset featuring both benign files and malware. …”
    Get full text
    Get full text
    Get full text
    Article