Search Results - solution ((((selection techniques) OR (computing techniques))) OR (learning techniques))

Refine Results
  1. 1
  2. 2

    Systematic review of intrusion detection system based on machine learning techniques for internet of things by Idris, Muhammad, Md Yasin, Sharifah, Audi, Giade Hamza

    Published 2023
    “…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
    Get full text
    Get full text
    Article
  3. 3

    Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman by Isman, Muhammad Iskandar

    Published 2017
    “…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Examining the impact of feature selection techniques on machine and deep learning models for the prediction of COVID-19 / Hafiza Zoya Mojahid ... [et al.] by Mojahid, Hafiza Zoya, Mohamad Zain, Jasni, Yusoff, Marina, Basit, Abdul, Jumaat, Abdul Kadir, Ali, Mushtaq

    Published 2025
    “…This research aims to provide insights into the optimal integration of feature selection techniques with advanced machine learning models for accurate prediction of COVID-19 virus.…”
    Get full text
    Get full text
    Article
  5. 5

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…Unlike existing OBL-based techniques, the PMT generates more than one candidate in multiple solution-space directions. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Integrated approach for improving cross-project software defect prediction performance by Bala, Yahaya Zakariyau

    Published 2024
    “…To tackle these challenges, this study proposes a holistic approach named Transformation, Feature Selection, and Multi-learning (TFSM). This research is divided into three objectives: firstly, to proposed transformation, feature selection and multi-learning techniques that can mitigate distribution differences between datasets, identify and eliminate redundant features and combat model overfitting, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Fuzzy Analytic Hierarchy Process (FAHP) and Fuzzy technique for Order Of Preference By Similarity To Ideal Solution (TOPSIS) in selecting the best Information Technology (IT) programs based on employer perspective / Nurshafiqah Aina Shah Bani by Shah Bani, Nurshafiqah Aina

    Published 2024
    “…This research aims to evaluate the employer perspective in choosing the best programs in the IT field by using the Fuzzy Analytic Hierarchy Process (FAHP) and Fuzzy Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An adaptive opposition-based learning selection: The case for jaya algorithm by Nasser, Abdullah B., Kamal Z., Zamli, Hujainah, Fadhl, Ghanem, Waheed Ali H. M., Saad, Abdul-Malik H. Y., Mohammed Alduais, Nayef Abdulwahab

    Published 2021
    “…Over the years, opposition-based Learning (OBL) technique has been proven to effectively enhance the convergence of meta-heuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    IoT intrusion detection using auto-encoder and machine learning techniques by Khudhu, Ahmed Ridha, Samsudin, Khairulmizam

    Published 2022
    “…Yet, the featureselection techniques used in the literature were based on feature selectionrather than a reduction in which individual solutions are being selected. …”
    Get full text
    Get full text
    Article
  14. 14

    Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE by Abbas Alhadeethy, Najwa Fadhil, Khedher, Akram M Z M, Shah, Asadullah

    Published 2012
    “…DL module has been augmented by ongoing developments in computer tools as well as techniques. The use of this learning technique has been increased in various domains such as e-commerce, banking and finance, as well as for speech and feature recognition to learn and classify intricate information. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Using Permutation-Based Feature Importance for Improved Machine Learning Model Performance at Reduced Costs by Khan, Adam, Ali, Asad, Khan, Jahangir, Ullah, Fasee, Faheem, Muhammad

    Published 2025
    “…This task is commonly achieved through Machine Learning (ML) techniques, but improving model performance typically incurs significant computational costs. …”
    Get full text
    Get full text
    Article
  16. 16

    Enhancing phishing detection with advanced ensemble learning techniques by Nur Syakirin Mohd Shahiran, Mohammed Ahmed

    Published 2025
    “…This study introduces an advanced phishing detection model that leverages ensemble learning techniques to improve accuracy, robustness, and adaptability. …”
    Get full text
    Get full text
    Article
  17. 17

    Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain by Mohammad Asif , Hossain

    Published 2022
    “…In this thesis, local sensing results are produced by SUs or vehicles by selecting the best spectrum sensing technique. The selection would be made based on the hybrid machine learning (ML) algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Neural Network Preference Learning Approaches For Improving Agent-Based Meeting Scheduling Problems by Tang, En Lai

    Published 2007
    “…Searching strategy is the negotiation technique that performed by SA in searching a suitable meeting timeslot. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…Meta-heuristic algorithms are search techniques used to solve complexoptimization problems, and these algorithms can help provide reasonable solutions in a shorter time thanexact methods. …”
    Get full text
    Get full text
    Get full text
    Article