Search Results - (( data optimization method algorithm ) OR ( software extraction method algorithm ))

Refine Results
  1. 1

    Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Ramarao, Taj, Mohammed Baloch

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks by Desta, Zahlay F., K.S., Rama Rao

    Published 2009
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines by K.S.R., Rao, Z.F., Desta

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with Levenberg Marquardt algorithm to train the ANN and Taguchi's Method to find optimal parameters of the algorithm and number of hidden neurons. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Autoreclosure in extra high voltage lines using taguchi's method and optimized neural networks by K.S.R, Rao, F. D., Zahlay

    Published 2008
    “…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi's Method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Efficient classifying and indexing for large iris database based on enhanced clustering method by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Khalaf, Ahmad Taha

    Published 2018
    “…The proposed method can be used to perform global search and exhibits quick convergence rate while optimizing the initial clustering centers of the K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A new model for iris data set classification based on linear support vector machine parameter's optimization by Faiz Hussain, Zahraa, Ibraheem, Hind Raad, Alsajri, Mohammad, Ali, Ahmed Hussein, Mohd Arfian, Ismail, Shahreen, Kasim, Sutikno, Tole

    Published 2020
    “…In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Software module clustering: An in-depth literature analysis by Qusay I., Sarhan, Ahmed, Bestoun S., Bures, Miroslav, Kamal Z., Zamli

    Published 2022
    “…The obtained data were then used to answer several research questions regarding state-of-the-art clustering approaches, applications of clustering in software engineering, clustering processes, clustering algorithms, and evaluation methods. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Specific heat capacity extraction of soybean oil/mxene nanofluids using optimized long short-term memory by Qazani, Mohammad Reza Chalak, Aslfattahi, Navid, Kulish, Vladimir Vladimirovich, Asadi, Houshyar, Schmirler, Michal, Zakarya, Muhammad, Alizadehsani, Roohallah, Haleem, Muhammad, Kadirgama, Kumaran

    Published 2024
    “…In comparison, 5% is used for testing and validation purposes of the developed algorithm. The newly proposed optimized SVR, GMDH, MLP, and LSTM are modelled in MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning by Abuzaraida, Mustafa Ali, A. L. gaud, Sarah, Abrahim Hneish, Hamza, Attarbashi, Zainab

    Published 2026
    “…The system demonstrated high efficiency and accuracy in performance, mimicking human coffee brewing methods. The results demonstrate the potential of the YOLOv8 algorithm to automate and optimize routine tasks with high accuracy.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Pothole detection using multispectral sensor and unmanned aerial vehicle imagery / Muhammad Hafiz Aizuddin Mohd Zaidi by Mohd Zaidi, Muhammad Hafiz Aizuddin

    Published 2024
    “…In earlier times, conventional methods such as field investigations and manual measurements were utilized to collect data and assess pavement distresses. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20