Search Results - (( based constructive method algorithm ) OR ( data integration method algorithm ))

Refine Results
  1. 1
  2. 2

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…These methods have been rigorously tested and compared against proprietary heuristic-based software and manual methods. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR by Marghany, Maged, Hashim, Mazlan

    Published 2007
    “…The basic concept of fuzzy algorithm was used to filter DInSAR data. The equation of phase difference was modified by involving the weighted least square method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A combinatory algorithm of univariate and multivariate gene selection by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2009
    “…Gene selection is usually based on univariate or multivariate methods. Univariate methods for gene selection cannot address interactions among multiple genes, a situation which demands the multivariate methods [1], [2]. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…The method constructs a Fuzzy-based Multidimensional Resource Scheduling model to obtain resource scheduling efficiency in cloud infrastructure. …”
    Get full text
    Get full text
    Article
  12. 12

    Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case) by Lytvyn, Oleg M., Nechuiviter, Olesia, Pershyna, Iuliia, Mezhuyev, Vitaliy

    Published 2019
    “…The proposed formula is based on the algorithm, which is also effective for a class of discontinuous functions.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
    Get full text
    Thesis
  14. 14

    An ensemble method with cost function on churn prediction by Mohd Khalid, Awang, Mohammad Afendee, Mohamed, Mokhairi, Makhtar

    Published 2019
    “…Therefore, this paper aims to achieve higher classification accuracy and at the same time, minimising ensemble classifiers by constructing a new ensemble method based on dimensionality reduction in soft set theory. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An Improved Integrative Random Forest for Gene Regulatory Network Inference of Breast Cancer by Chandran, Suntharaamurthi, Kohbalan, Moorthy, Mohd Arfian, Ismail, Mohd Zamri, Osman, Mohd Azwan Mohamad, Hamza, Ernawan, Ferda

    Published 2018
    “…Gene Regulatory Network (GRN) inference aims to capture the regulatory influences between the genes and regulatory events in the GRN. Integrative Random Forest for Gene Regulatory Network Inference (iRafNet) is a RF based algorithm which provides a great result in constructing GRN inference by integrating multiple data types. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  20. 20

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This study addresses the urgent issue of detecting hidden defects in semiconductor wafers that conventional methods overlook. This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis