Search Results - (( basic computing machine algorithm ) OR ( evolution optimization mead algorithm ))
Search alternatives:
- evolution optimization »
- machine algorithm »
- optimization mead »
- mead algorithm »
-
1
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
Get full text
Get full text
Get full text
Article -
2
-
3
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Comparative study on job scheduling using priority rule and machine learning
Published 2021“…We’ve achieved better for SJF and a decent machine learning algorithm outcome as well.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006Get full text
Get full text
Thesis -
7
-
8
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The results show proposed algorithm approximately solved problems averagely 22% better in terms of find feasible optimal solutions depends of various performance measures in 72.2% of computational time than other previous considered key algorithms.…”
Get full text
Get full text
Thesis -
9
Development of virtual control panel for single spindle configuration 2-axis filament winding machine(SSFWM)
Published 2009Get full text
Get full text
Undergraduates Project Papers -
10
-
11
Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling
Published 2013“…Each category of jobs is served along with First-Come First-Served (FCFS) basic using the Multiple Queues Multiple Machines (MQMM) configuration. …”
Get full text
Get full text
Thesis -
12
-
13
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
Conference Paper -
14
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
15
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
16
Robust correlation feature selection based support vector machine approach for high dimensional datasets
Published 2025“…The third step employs the support vector machine algorithm to calculate prediction values. …”
Get full text
Get full text
Get full text
Article -
17
Shot boundary detection based on orthogonal polynomial
Published 2019“…Finally, the support vector machine is utilized to detect hard transitions. In addition, a comparison between the proposed algorithm and other state-of-the-art algorithms is performed to reinforce the capability of the proposed work. …”
Get full text
Get full text
Get full text
Article -
18
Data Management System for Local Entrepreneur
Published 2019“…In the early 1950s, the first computer programs were developed and focused almost completely on coding algorithms and languages. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Enhancement of network security by use machine learning
Published 2019“…From the analysis in the simulation results, one can see that the ANNDL is the best algorithm of machine learning process. This method uses many layers to compute or process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. …”
Get full text
Get full text
Thesis
