Search Results - (( wave optimization means algorithm ) OR ( data detection means algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The mean path cost generated by the LS algorithm, on the other hand, is 14% higher than that generated by the PRM. …”
    Get full text
    Thesis
  2. 2
  3. 3

    Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction by Alqushaibi, A., Abdulkadir, S.J., Rais, H.M., Al-Tashi, Q., Ragab, M.G., Alhussian, H.

    Published 2021
    “…Therefore, the wind plays an essential role in the oceanic atmosphere and contributes to the formation of waves. This paper proposes an enhanced weight-optimized neural network based on Sine Cosine Algorithm (SCA) to accurately predict the wave height. …”
    Get full text
    Get full text
    Article
  4. 4

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The purpose of this study is to apply the K-Means algorithm to perform clustering on COVID-19 data to determine the high spread of the virus in regions in Indonesia based on the frequency of the data. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Mohd Sharif, Zakaria, Mohammad Fadhil, Abas, Fatimah, Dg Jamil, Norhafidzah, Mohd Saad, Addie, Irawan, Pebrianti, Dwi

    Published 2024
    “…The test results show promising results with obtained mean RMSE =1407.2303, mean MAPE =0.7135, and mean detection time =2.6129s for a data range of between 3955 to 9057.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Rock brittleness prediction through two optimization algorithms namely particle swarm optimization and imperialism competitive algorithm by Hussain, Azham, Surendar, A., Clementking, A., Kanagarajan, Sujith, Ilyashenko, Lubov K.

    Published 2018
    “…The main goal of this research work is to propose the novel practical models to predict the BI through particle swarm optimization (PSO) and imperialism competitive algorithm (ICA). …”
    Get full text
    Get full text
    Article
  12. 12

    Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods by Zakaria, Mohd Sharif, Abas, Mohammad Fadhil, Dg Jamil, Fatimah, Mohd Saad, Norhafidzah, Hashim, Addie Irawan, Pebrianti, Dwi

    Published 2024
    “…The test results show promising results with obtained mean RMSE =1407.2303, mean MAPE =0.7135, and mean detection time =2.6129s for a data range of between 3955 to 9057.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  14. 14

    A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works by Gorment N.Z., Selamat A., Krejcar O.

    Published 2023
    “…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
    Conference Paper
  15. 15

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…Outlier detection in linear data sets has been done vigorously but only a small amount of work has been done for outlier detection in circular data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset by Chui, K.T., Lytras, M.D., Vasant, P.

    Published 2020
    “…A generative adversarial network offers synthetic data to reduce bias in the detection model. Improved fuzzy c-means clustering considers the relationship between adjacent data points in the fuzzy membership function. …”
    Get full text
    Get full text
    Article
  20. 20

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article