Search Results - (( parameter optimization method algorithm ) OR ( general detection method algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail

    Published 2023
    “…Therefore, an optimization method is needed to solve this issue, and one of the best methods to be applied is Butterfly Optimization Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…The aim of this work is to develop an improved optimization method for IDS that can be efficient and effective in subset feature selection and parameters optimization. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  5. 5

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Early detection of dengue disease using extreme learning machine by Suhaeri, Suhaeri, Mohd Nawi, Nazri, Fathurahman, Muhamad

    Published 2018
    “…Therefore, the proposed ELM model can be considered as an alternative algorithm to apply for early detection of Dengue disease.…”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…The interpretation of results becomes more accurate by assessing and comparing tomography reconstructions of the three wave parameters. Following that, a new implementation procedure for tomography technique utilizing the proposed wave parameters is recommended to optimize instrumentation and signal processing potentially for reliable in-situ assessment purposes.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The optimal scale, shape and compactness parameters of multi-resolution segmentation have been determined and the detection accuracy was evaluated based on receiver operating characteristics (ROC). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimization of feature selection in Support Vector Machines (SVM) using recursive feature elimination (RFE) and particle swarm optimization (PSO) for heart disease detection by Bayuaji, Luhur, Kusnadi, Kusnadi, Amzah, Mochamad Yamin, Pebrianti, Dwi

    Published 2024
    “…RFE combines a dimensionality reduction process with a machine learning process where the least important features are iteratively removed until the best feature subset is obtained, while the PSO method is used to optimize the C and gamma parameters of SVM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Image Splicing Detection With Constrained Convolutional Neural Network by Lee, Yang Yang

    Published 2019
    “…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi by Seyed Hossein, Mahdavi

    Published 2016
    “…As a consequence, the computational performance of structural health monitoring strategies will be directly influenced by the higher computational competency and convergence rate of the proposed wavelet-based method for structural simulation. Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap by Noor Shah Rizal, Abdul Manap

    Published 2018
    “…Due to the difficulty of existing techniques employing different types of algorithm, the usual optimal coordination of overcurrent relays is generally carried out by heuristic, meta-heuristic optimization methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    High impedance fault detection and localization in 11kV distribution system / Mohd Syukri Ali by Mohd Syukri , Ali

    Published 2018
    “…In this process, the grey wolf optimization (GWO) technique is adopted in order to provide the optimal value of ANN parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Robust techniques for linear regression with multicollinearity and outliers by Mohammed, Mohammed Abdulhussein

    Published 2016
    “…The proposed method is formulated by incorporating robust MM-estimator and the modified generalized M-estimator (MGM) in the LRR algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20