Search Results - (( site detection model algorithm ) OR ( wave optimization bat algorithm ))*

Refine Results
  1. 1

    Optimized controllers for stabilizing the frequency changes in hybrid wind-photovoltaic-wave energy-based maritime microgrid systems by Peddakapu, K., Mohd Rusllim, Mohamed, Srinivasarao, P., Licari, J.

    Published 2024
    “…The AOA-based 2DOF-TIDN performance is compared to the following algorithms: genetic, Jaya, bat, grasshopper optimization, particle swarm optimization, and moth flame optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Furthermore, existing algorithms face challenges in complex work sites, such as detecting long-distance, occluded, dense, and low-light objects. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
    Get full text
    Get full text
    Research Reports
  6. 6

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…Transferability of each of the models was verified by testing in another site for consistency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Real-time personal protective equipment compliance detection using you only look once by Nurhanisah, Aminuddin, Nor Azuana, Ramli, Pratondo, Agus

    Published 2024
    “…The proposed research work employs the system of object detection from CCTV videos around the working sites of company XYZ through a framework that includes image acquisition, data collection, and video data pre-processing, with the implementation of various deep learning algorithms using state-of-the-art models such as You Only Look Once (YOLO) including YOLOv5, YOLOv7, and YOLOv8. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection by Muhammad Arif, Mohamad, Muhammad Aliif, Ahmad, Zuriani, Mustaffa

    Published 2024
    “…There are multiple techniques in training the network, one of which is training with metaheuristic algorithms. Metaheuristic algorithms that aim to develop more effective hybrid algorithms by combining the good and successful aspects of more than one algorithm are algorithms inspired by nature. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection by Ng, Shi Ya

    Published 2022
    “…The significance of the extracted output is evaluated with the topic modelling algorithm (LDA model algorithm) for the purpose of predictive supply risk. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12
  13. 13

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…This approach can be deployed as an autonomous detection system without the need for any offline retraining process of the model to detect the evolved XSS attack.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…The BFGS quasi-Newton (TRAINBFG) and Levenberg-Marquart (TRAINLV) have been adopted as training algorithms of the neural network model. Real site data was captured from a 3x700MWatt coal-fired thermal power plant in Perak state - Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism by Yan, Zuo, Chai, Soo See, Goh, Kok Luong

    Published 2024
    “…The results showed that the detection accuracy of the improved YOLOv8 model reached 82.71%, thus meeting the application requirements.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Real-time safety helmet detection using enhanced YOLOv5 object detection by Muhammad Zamri, Fatin Najihah, Zulkurnain, Nurul Fariza, Gunawan, Teddy Surya, Kartiwi, Mira, Md Yusoff, Nelidya, Nur, Levy Olivia

    Published 2023
    “…Extensive research was conducted to analyze all feasible algorithms that can be implemented in the safety helmet detection system and compare the proposed model with an existing one to ensure the proposed system can give high accuracy and high inference speed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper