Search Results - different ((((equations algorithm) OR (detection algorithm))) OR (selection algorithm))

Refine Results
  1. 1

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…We then develop a new algorithm to address the summarizing strategies identification problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…The video then are segmented into images using SC Video Developer. Ten images are selected to be used in this project. The algorithm created is used to detect the ball in the images. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article
  5. 5

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…This extension of Autometrics for model selection was also developed for multiple equations by integrating it with seemingly unrelated regressions equations (SURE) and estimated using feasible generalized least squares (FGLS), known as SURE-Autometrics algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A new stepsize for gradient method via weak secant equation by Leong, Wah June

    Published 2007
    “…The algorithm then selects the stepsizes along the negative gradient using a new approximation of the Hessian based on the weak secant equation. …”
    Get full text
    Conference or Workshop Item
  12. 12

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…To achieve such goal, this research modifies and improves the Reduction with Selective Redundancy (RSR) algorithm. In the modify algorithm, test cases would be selected according to the branch coverage if they covered different branch combination. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Performance Enhancement Of Artificial Bee Colony Optimization Algorithm by Abro, Abdul Ghani

    Published 2013
    “…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Feature selection algorithms for Malaysian dengue outbreak detection model by Husam I.S. Abuhamad, Azuraliza Abu Bakar, Suhaila Zainudin, Mazura Sahani, Zainudin Mohd Ali

    Published 2017
    “…Many studies have been conducted to model and predict dengue outbreak using different data mining techniques. This research aimed to identify the best features that lead to better predictive accuracy of dengue outbreaks using three different feature selection algorithms; particle swarm optimization (PSO), genetic algorithm (GA) and rank search (RS). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Quarter-sweep preconditioned relaxation method, algorithm and efficiency analysis for fractional mathematical equation by Andang Sunarto, Praveen Agarwal, Jumat Sulaiman, Chew, Jackel Vui Lung, Shaher Momani

    Published 2021
    “…The paper presents the formulation of the quarter-sweep finite difference scheme that is used to approximate the selected fractional mathematical equation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
    Get full text
    Get full text
    Get full text
    Article