Search Results - (( data internalization based algorithm ) OR ( using optimization modified algorithm ))

Refine Results
  1. 1

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Curve fitting by rational cubic Bézier with C1 and G1 continuity using metaheuristics methods by Najihah, Mohamed, Ahmad Lutfi, Amri Ramli, Ahmad, Abd Majid, Abd Rahni, Mt Piah

    Published 2019
    “…Those metaheuristics algorithms are Harmony Search, Genetic Algorithm, Particle Swarm Optimization and Modified Harmony Search. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Reactive memory model for ant colony optimization and its application to TSP by Sagban, Rafid, Ku-Mahamud, Ku Ruhana, Abu Bakar, Muhamad Shahbani

    Published 2014
    “…The performances of six (6) ant colony optimization variants were evaluated to select the base for the proposed model.Based on the results, Max-Min Ant System has been chosen as the base for the modification.The modified algorithm called RMMAS, was applied to TSPLIB95 data and results showed that RMMAS outperformed the standard MMAS.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm by Yasin, Azman, M. Zeki, Akram, Mohammed, Ghassan N.

    Published 2013
    “…The quality of the watermarked images is considered as one of the most important requirements of any watermarking system.In most applications, the watermarking algorithm embeds the watermark without affecting the quality of the host media.In this study, a comparison of watermarking image quality was performed between two existing methods: Dual Intermediate Significant Bit (DISB) an d Genetic Algorithm (GA).The first method focuses on the high quality of the watermarked image based on DISB model and this method requires embedding two bits into every pixel of the original image, while the other six bits are modified so as to immediately assimilate the original pixel. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Modeling the powder compaction process using the finite element method and inverse optimization by Hrairi, Meftah, Chtourou, Hedi, Gakwaya, Augustin, Guillot, Michel

    Published 2011
    “…Minimization of the objective function with respect to the material parameters was performed using an in-house optimization software shell built on a modified Levenberg–Marquardt method. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhancement and assessment of WKS variance parameter for intelligent 3D shape recognition and matching based on MPSO by Naffouti, S.E., Aouissaoui, I., Fougerolle, Y., Sakly, A., Meriaudeau, F.

    Published 2017
    “…This paper presents an improved wave kernel signature (WKS) using the modified particle swarm optimization (MPSO)-based intelligent recognition and matching on 3D shapes. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm by Rosmazi, Rosli, Zamri, Mohamed

    Published 2021
    “…A comparison was done against particle swarm optimization, genetic algorithm, and sine–cosine algorithm, where the modified cuckoo search algorithm showed the lowest root mean square error and fastest convergence rate among the three algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Clustering technique is able to find hidden patterns and to extract useful information from huge data. Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…A set of modified and novel optimization algorithms are proposed in this thesis to deal with different single and multi-objective OPF problems. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering by Rashed, Alwatben Batoul

    Published 2022
    “…Moreover, interpretability also recorded better results on testing problems, where most of the number of rules were fewer than 33. A clustering algorithm based on MOPSO-CD with a modified archive update mechanism (MCPSO-CD) was used to estimate the optimal number of clusters. …”
    Get full text
    Get full text
    Thesis
  20. 20

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
    Get full text
    Get full text
    Thesis