Search Results - (evolutionary OR evolution) ((evaluation techniques) OR (detection techniques))

Refine Results
  1. 1

    Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency by Bello, AbdulKarim, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Zulzalil, Hazura

    Published 2018
    “…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    On the automation of vulnerabilities fixing for web application by Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia, Abdullah @ Selimun, Mohd Taufik

    Published 2014
    “…The research community have devoted considerable amount of efforts to address this problem by proposing many techniques for automated vulnerabilities detection and fix generation for web application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The proposed technique is named Evolutionary Cost-Cognizant Regression Test Case Prioritization (ECRTP). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…One of the most dynamic areas in AI research is object detection, a field that continues to evolve due to advancements in chip computing power and deep learning techniques. …”
    Get full text
    Get full text
    Article
  6. 6

    Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation by Illias, Hazlee Azil, Wee, Zhao Liang

    Published 2018
    “…The superiority of the modified PSO technique with SVM was evaluated by comparing the results with the actual fault diagnosis, unoptimised SVM and previous reported works. …”
    Get full text
    Get full text
    Article
  7. 7

    Metric-based code smell detection technique for python software by Leeman, Samaila Ja'afaru

    Published 2018
    “…In the second phase, details of conceptual and architectural design of the metric-based technique are presented. Thirdly, PySTect technique is implemented and evaluated in three experiments. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Performance analysis of spectrum sensing methods: A numerical approach by Hasan M.K., Ismail A.F., Abdalla A.H., Ramli H.A.M., Islam S., Hashim W.

    Published 2023
    “…Errors; Femtocell; Heterogeneous networks; Intelligent systems; Monte Carlo methods; Numerical methods; Orthogonal frequency division multiplexing; Critical challenges; HetNeT; Numerical approaches; Orthogonal frequency division multiplexing systems; Performance analysis; Spectrum; Spectrum detection; Spectrum sensing techniques; Long Term Evolution (LTE)…”
    Conference Paper
  10. 10

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Two level Differential Evolution algorithms for ARMA parameters estimatio by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Aibinu, Abiodun Musa

    Published 2013
    “…The problem of determining simultaneously the model order and coefficient of an Autoregressive Moving Average (ARMA) model is examined in this paper. An Evolutionary Algorithm (EA) comprising two-level Differential Evolution (DE) optimization scheme is proposed. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Bio-inspired for Features Optimization and Malware Detection by Mohd Faizal, Ab Razak, Nor Badrul, Anuar, Fazidah, Othman, Ahmad, Firdaus, Firdaus, Afifi, Rosli, Salleh

    Published 2018
    “…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Dynamic risk analysis on process safety: a review of the evolution, approach, and advantages in the industry / Nurul Hazira Zizemurikan by Zizemurikan, Nurul Hazira

    Published 2022
    “…Dynamic risk assessment is a scientific technique for identifying hazards, evaluating risk, and appraising the working environment. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Bio-inspired for Features Optimization and Malware Detection by Razak, Mohd Faizal Ab, Anuar, Nor Badrul, Othman, Fazidah, Firdaus, Ahmad, Afifi, Firdaus, Salleh, Rosli

    Published 2018
    “…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
    Get full text
    Get full text
    Article
  17. 17

    From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks by Anabi, Hilary K., Nordin, Rosdiadee, Abdulghafoor, Omar B., Sali, Aduwati, Mohamedou, Ahmed, Almqdshi, Abdulmajid, Abdullah, Nor Fadzillah

    Published 2017
    “…Previously, spectrum sensing was the main technique for detecting the presence/absence of a primary user (PU) signal in a given radio frequency (RF) spectrum. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…Therefore, this thesis presents novel techniques for voltage stability evaluation and enhancement in power system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparison of detection model using machine learning on android malware / Muhammad Ikmal Ihsan by Ihsan, Muhammad Ikmal

    Published 2022
    “…It also evaluated and train the selection of Android characteristics to evaluate the malware detection model's performance. …”
    Get full text
    Get full text
    Student Project
  20. 20