Search Results - (( data implication optimization algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  6. 6

    Modified Harris Hawks Optimization Algorithm For Protein Multiple Sequence Alignment by Ibrahim, Al-Zaidi Mohammed Khaleel

    Published 2024
    “…A notable entrant in this domain is the harris hawks optimization (hho) algorithm, which has distinguished itself through published optimization outcomes, positioning it as a formidable competitor among state-of-the-art metaheuristics. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Modelling of heuristic distribution algorithm to optimize flexible production scheduling in Indian industry by Reddy, Guduru Ramakrishna, Singh, Harpreet, Domeika, Aurelijus, Manoj Kumar, Nallapaneni, Quanjin, Ma

    Published 2020
    “…In the present work, Two Heuristic Algorithms are modelled and the best algorithm among those two Heuristics is selected after few comparisons 3M to 5M, this can optimize the scheduling processes up to 10x10 jobs i.e. 10 machines and 10 jobs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Gender classification on skeletal remains: efficiency of metaheuristic algorithm method and optimized back propagation neural network by Hairuddin, Nurul Liyana, Yusuf, Lizawati Mi, Othman, Mohd Shahizan

    Published 2020
    “…Besides that, another limitation that exists in previous researches is the absence of parameter optimization for the classifier. Thus, this paper proposed metaheuristic algorithms such as Particle Swarm Optimization, Ant Colony Algorithm and Harmony Search Algorithm based feature selection to identify the most significant features of skeleton remains. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Ahmad Salihin, Samsudin, Amir Izzani, Mohamed, Mohd Mawardi, Saari

    Published 2025
    “…Three distinct metaheuristic algorithms were investigated: Barnacles Mating Optimizer (BMO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA), each integrated with CatBoost to optimize critical parameters including learning rate, tree depth, regularization, and bagging temperature. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    A hybrid deep learning-based unsupervised anomaly detection in high dimensional data by Muneer, A., Taib, S.M., Fati, S.M., Balogun, A.O., Aziz, I.A.

    Published 2022
    “…However, Adamax optimization algorithm showed the best results when employed to train the DANN model. …”
    Get full text
    Get full text
    Article
  15. 15

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Prediction of payment method in convenience stores using machine learning by Pratondo, Agus, Novianty, Astri, Pudjoatmodjo, Bambang

    Published 2023
    “…The dataset used in this study was collected from a diverse sample of the Indonesian population, reflecting the multifaceted nature of payment behaviors in the region. The Random Forest algorithm was employed due to its robustness in handling complex, high-dimensional data, and its ability to provide reliable predictions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    The advancement of artificial intelligence's application in hybrid solar and wind power plant optimization: a study of the literature by Mauludin, Mochamad Subchan, Khairudin, Moh., Asnawi, Rustam, Mustafa, Wan Azani, Toha, Siti Fauziah

    Published 2024
    “…Our findings underscore prevalent methodologies such as computational modellingutilizing software suites like MATLAB/Simulink, HOMER, and others to derive empirical data. Additionally, parametric analyses emerge as the predominant approach, characterized by the application of algorithms such as Particle Swarm Optimization (PSO), Fuzzy Logic Control (FLC), and Genetic Algorithms (GA), among others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
    Get full text
    Get full text
    Article