Search Results - evolution ((detection technique) OR (((computing techniques) OR (mining techniques))))

Search alternatives:

Refine Results
  1. 1

    Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee by Hiromi , Wong, Siew , Lan, Valery, Fred Lee

    Published 2004
    “…The report will cover the literature review that started with an introduction to computer auditing, introduction to data mining, data mining techniques (classification, neural network and sequential analysis), and the existing data mining software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A review of homogenous ensemble methods on the classification of breast cancer data by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2024
    “…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A review of homogenous ensemble methods on the classification of breast cancer data by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2024
    “…Data mining is a concept established by computer scientists to lead a secure and reliable classification and deduction of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Overview and future opportunities of sentiment analysis approaches for big data by Mohd Sharef, Nurfadhlina, Mat Zin, Harnani, Nadali, Samaneh

    Published 2016
    “…The contribution of this paper is two-fold: (i) this study reviews the state of the art of SA approaches. including sentiment polarity detection, SA features (explicit and implicit), sentiment classification techniques and applications of SA and (ii) this study reviews the suitability of SA approaches for application in the big data frameworks, as well as highlights the gaps and suggests future works that should be explored. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Metric-based code smell detection technique for python software by Leeman, Samaila Ja'afaru

    Published 2018
    “…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In this work, a new islanding detection technique is proposed based on combination of Slantlet Transform and Ridgelet Probabilistic Neural Network to detect islanding conditions from other disturbance for a 250-kW PV array connected to a typical North American distribution grid and a wind farm power generation system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Many statistical and data mining techniques have been used to predict time series stock market. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Lattice Sphere Detection Techniques In Block Data Transmission And Multiuser Wireless Systems by Albreem, Mahmoud A. M.

    Published 2013
    “…Owing to its high computational load, lattice sphere detection (LSD) technique and its variants had been proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A wireless precoding technique for millimetre-wave MIMO system based on SIC-MMSE by Boby, Rounakul Islam, Abdullah, Khaizuran, Jusoh, Ahmad Zamani, Parveen, Nagma, Asnawi, Ani Liza

    Published 2019
    “…To improve the conventional mm-wave MIMO nodal detection and coordination performance, the system processes data using symbolized error vector technique for linearization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Antipatterns detection approaches in object-oriented design: a literature review by Din, Jamilah, Al-Badareen, Anas Bassam, Jusoh, Yusmadi Yah

    Published 2012
    “…Design pattern detection is a useful technique for gaining knowledge on the design issues of existing systems and improves the system's comprehension, which consequently enhance the software maintainability and evolution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution by Abdulrazak Yahya, Saleh, Haza Nuzly, Abdull Hamed, Siti Mariyam, Shamsuddin, Ashraf, Osman Ibrahim

    Published 2018
    “…Clustering is one of the essential unsupervised learning techniques in Data Mining. In this paper, a new hybrid (K-DESNN) approach to combine differential evolution and K-means evolving spiking neural network model (K-means ESNN) for clustering problems has been proposed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    Accelerator-based human activity recognition using voting technique with NBTree and MLP classifiers by Azmi M.S.M., Sulaiman M.N.

    Published 2023
    “…In evolution and ubiquitous computing systems, accelerometer-based human activity recognition has huge potential in a large number of application domains. …”
    Article
  18. 18

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. The evolution of authoritative immunofingerprint mining technology is exerting a growing influence on comprehensive cancer diagnosis biology. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin by Shamsuddin, Mohd Razif, Abd Hamid, Nurzeatul Hamimah, Jasmin, Muhammad Syafiq

    Published 2012
    “…With the help of webcam, human can interact with computer by using their hand gesture. With this technique we can substitute the use of mouse or keyboard to control slide presentation. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Segmentation of Retinal Vasculature using Active Contour Models (Snakes) by Pang , Kee Yong

    Published 2009
    “…Active contour model (snake) that based on level sets, techniques of curve evolution, and Mumford-Shah functional for segmentation is then used to segment out the detected retinal vessel and produce a complete retinal vasculature. …”
    Get full text
    Final Year Project