Search Results - (( basic optimization based algorithm ) OR ( based optimization learning algorithm ))
Search alternatives:
- optimization learning »
- basic optimization »
- learning algorithm »
-
1
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
2
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
3
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
4
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
Get full text
Get full text
Get full text
Article -
5
Adaptive mechanism for enhanced performance of shark smell optimization / Nur Atharah Kamarzaman, Shahril Irwan Sulaiman and Intan Rahayu Ibrahim
Published 2021“…Numerical results indicate that the ASSO algorithm strategy outperforms the basic SSO algorithm, Genertic Algorithm (GA), Particle Swarm Intelligence (PSO), Firefly Algorithm (FA), Artificial Bee Colony (ABC) and Teaching Learning Based Optimization (TBLO) in term of reaching for global solution.…”
Get full text
Get full text
Get full text
Article -
6
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
Get full text
Get full text
Thesis -
8
Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach
Published 2022“…Hence, this research’s objective aimed to propose an optimization strategy based on Structural Modification and Optimizing Training Network for improving the lacking of accuracy of response in the chatbot application, to propose the algorithm enhancement to improve the current attention mechanism in the Attentive Sequence-to-Sequence model and the network’s training optimization of its inability to memorize the dialogue history, and lastly, to evaluate the accuracy of response of the proposed solution through data training on loss function and real data testing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
10
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
11
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Main resources, server log files become a set of raw data where it's must go through with all the Web usage mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E-Learning portal. …”
Get full text
Get full text
Get full text
Thesis -
12
Web usage mining for UUM learning care using association rules
Published 2004“…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
Get full text
Get full text
Thesis -
13
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis -
14
Neural Network – A Black Box Model
Published 2024“…A variety of metaheuristic algorithms have been used to train ANN, including Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Ant Colony Optimization (ACO), Tabu Search (TS), and Harmony Search (HS). …”
Get full text
Get full text
Get full text
Book Chapter -
15
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
16
An Optimized Support Vector Machine (SVM) based on Particle Swarm Optimization (PSO) for cryptocurrency forecasting
Published 2019“…Some may use Machine Learning Algorithms to execute their trades. However, forecasting result using basic SVM algorithms does not really promising. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
A new modern scheme for solving fractal–fractional differential equations based on deep feedforward neural network with multiple hidden layer
Published 2024“…Thus, this research aims to extend the application of ANN to solve FFDE with power law kernel in Caputo sense (FFDEPC) by develop a vectorized algorithm based on deep feedforward neural network that consists of multiple hidden layer (DFNN-2H) with Adam optimization. …”
Get full text
Get full text
Article -
18
-
19
A simplified PID-like ANFIS controller trained by genetic algorithm to control nonlinear systems
Published 2010“…In addition, the real-coded Genetic Algorithm (GA) has been utilized to train this ANFIS controller, instead of the hybrid learning methods that are widely used in the literature, and hence, the necessity for the teaching signal required by other techniques has been eliminated. …”
Get full text
Get full text
Get full text
Article -
20
Improving neural networks training using experiment design approach
Published 2005“…Conventionally, the parameters of a neural network are tuned by minimizing an objective function based on a pre-determined set of training data. This training paradigm is passive in the sense that the neural network only learns from the training patterns presented to it by the environment or a teacher. …”
Get full text
Get full text
Thesis
