Search Results - (( data optimization method algorithm ) OR ( software version method algorithm ))

Refine Results
  1. 1

    An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems by Abdulwahab, Haneen A., Noraziah, Ahmad, Al-Sewari, Abdul Rahman Ahmed Mohammed, Salih, Sinan Q.

    Published 2019
    “…Recently, nature-inspired algorithms have been proposed and utilized for solving the optimization problems in general, and data clustering problem in particular. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…In these systems, voting algorithms are extensively employed to arbitrate among the results of N redundant hardware modules or software versions. …”
    Get full text
    Get full text
    Thesis
  3. 3

    High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm by Mohd Sabri, Nor Amalina

    Published 2015
    “…The information then is used to generate a directed graph in order to obtain the shortest path results through the implementation of shortest path algorithm. The main algorithms involve is Dijkstra’s algorithm and then an Ant Colony Optimization algorithm is used as hybrid versions of Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Regression test case selection & prioritization using dependence graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The goal is to identify changes in a method's body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism, select the test cases based on affected statements and ordered them based on their fitness by using GA.The number of affected statements determined how fit a test case is good for regression testing. …”
    Get full text
    Get full text
    Article
  5. 5

    Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan by Hassan, Hasniliati

    Published 2017
    “…The method proposed is to design DNA assembly algorithms in Verilog HDL and implemented it in ASIC design flow. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimizing skyline query processing in incomplete data by Gulzar, Yonis, Alwan, Ali Amer, Turaev, Sherzod

    Published 2019
    “…Skyline queries are used to identify superior data items in the database. Most of the previously proposed skyline algorithms work on a complete database where the data are always present (non-missing). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…These two models are based on topological placement method. DM is optimized using genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Review of intelligence for additive and subtractive manufacturing: current status and future prospects by Rahman, M Azizur, Saleh, Tanveer, Jahan, Muhammad Pervej, McGarry, Conor, Chaudhari, Akshay, Huang, Rui, Tauhiduzzaman, M, Ahmed, Afzal, Mahmud, Abdullah Al, Bhuiyan, Md. Shahnewaz, Khan, Md Faysal, Alam, Md. Shafiul, Shakur, Md Shihab

    Published 2023
    “…The challenges comprise difficulty in self-optimizing CNC systems considering real-time material property and tool condition, defect detections by in-situ AM process monitoring, issues of overfitting and underfitting data in ML models and expensive and complicated set-ups in hybrid manufacturing processes.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers by Asmawi, Aziah, Md Yasin, Sharifah, Mohd Shah, Nur Hazierah

    Published 2024
    “…The existing tools for evidence collection primarily rely on SHA-1 hashing and using older version windows and software toolkits version. Therefore, this study proposes the addition in toolkits implementation, the latest software tools version and the latest solution, an improvement proof-of-concept utilizes SHA-256 hashing algorithm to improve the collection of evidence and enhance integrity. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…In this study we show how to apply a particular class of optimization methods known as pattern search methods to address these challenges. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Data-Driven control based on marine predators algorithm for optimal tuning of the wind plant by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali

    Published 2022
    “…Comparative results alongside other existing metaheuristic-based algorithms further confirmed excellence of the proposed method through its superior performance against the slime mould algorithm (SMA), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), grey wolf optimizer (GWO), and safe experimentation dynamics (SED) algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost by Chen, Suihai, Bong, Chih How, Chiu, Po Chan

    Published 2024
    “…PSO-EBGWO is used to optimize the parameters of the CatBoost model. In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Data clustering using the bees algorithm by Pham, D.T, Otri, S., Afify, A., Mahmuddin, Massudi, Al-Jabbouli, H.

    Published 2007
    “…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An improved K-nearest neighbour with grasshopper optimization algorithm for imputation of missing data by Zainal Abidin, Nadzurah, Ismail, Amelia Ritahani

    Published 2021
    “…Thus, this paper proposes a novel method for imputation of missing data, named KNNGOA, which optimized the KNN imputation technique based on the grasshopper optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article