Search Results - (( data transformation method algorithm ) OR ( using solution using algorithm ))

Refine Results
  1. 1

    Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization by Pang, Jia Hong

    Published 2011
    “…The genetic algorithms is proven to be a very effective method in optimization by using the way imitating natural process of living beings such as crossover, mutation and selection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-objective clustering algorithm using particle swarm optimization with crowding distance (MCPSO-CD) by Rashed, Alwatben Batoul, Hamdan, Hazlina, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Yaakob, Razali, Abubakar, Mansir

    Published 2020
    “…Clustering, an unsupervised method of grouping sets of data, is used as a solution technique in various fields to divide and restructure data to become more significant and transform them into more useful information. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Identification of transformer fault based on dissolved gas analysis using hybrid support vector machine-modified evolutionary particle swarm optimisation by Illias, Hazlee Azil, Wee, Zhao Liang

    Published 2018
    “…Dissolved Gas Analysis (DGA) technique is commonly used to identify oil-filled power transformer fault type but utilisation of artificial intelligence method with optimisation methods has shown convincing results. …”
    Get full text
    Get full text
    Article
  5. 5

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…The PC_Miner algorithm traverses the PC_Tree by using an efficient pruning technique. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    CSI-based human activity recognition via lightweight compact convolutional transformers by Wong, Yan Chiew, Abuhoureyah, Fahd Saad Amed, Al-Taweel, Malik Hasan, Abdullah, Nihad Ibrahim

    Published 2024
    “…The lightweight Compact Convolutional Transformer (CCT) algorithm proposed in this work offers a solution by streamlining the process of leveraging CSI data for activity recognition in such complex data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Global optimization method for continuous - Time sensor scheduling by Woon, Siew Fang, Rehbock, Volker, Loxton, Ryan C.

    Published 2010
    “…We consider a situation in which several sensors are used to collect data for signal processing since operating multiple sensors simultaneously canses system interference, only one sensor can be active at any one time.The problem of scheduling a discrete-valued optimal control problem.This problem cannot be solved using conventional optimization problem.The Transformed problem is then decomposed into a bi-level optimization problem, which is solved using a discreate filled function method in conjunction with a conventional optimal control algorithm.Numerical results show that our algorithm is robust, efficient, and reliable in attaining a near globally optimal solution.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Pengesanan Kerosakan Bahan Penebat Transformer Dengan Menggunakan Rangkaian Neural Buatan by Che Osman, Suzita

    Published 2006
    “…Three types of learning algorithm are used in this project to train the MLP network, which are resilient backpropagation, Bayesian regularization and Levenberg-Marquardt. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Fuzzy Soft Set Clustering for Categorical Data by Iwan Tri Riyadi, Yanto, Ani, Apriani, Rofiul, Wahyudi, Cheah, Wai Shiang, Suprihatin, in, Rahmat, Hidayat

    Published 2024
    “…Conventional clustering, such as k-means, cannot be openly used to categorical data. Numerous categorical data using clustering algorithms, for instance, fuzzy k-modes and their enhancements, have been developed to overcome this issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application of boundary-fitted convolutional neural network to simulate non-Newtonian fluid flow behavior in eccentric annulus by Kumar, A., Ridha, S., Ilyas, S.U., Dzulkarnain, I., Pratama, A.

    Published 2022
    “…The performance of the algorithm is validated with experimental data available from published studies. …”
    Get full text
    Get full text
    Article
  13. 13

    Analytical approach to unidirectional flow of non-Newtonian fluids of differential type by Abdulhameed, Mohammed

    Published 2015
    “…Both of these two problems are solved using a new modified homotopy perturbation transform method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The basic statistical frequency method was used to analyse the performance result. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…This outcome is characterised by a linear procedure and lacks the ability to combine data from multiple rows. The suggested ShiftRows algorithm utilises DNA-specific characteristics of the nucleotides {A, T, G, C}. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Initialization procedure in solving Optimal Power Flow (OPF) using Artificial Immune System (AIS) optimization technique / Aimi Idzwan Tajudin by Tajudin, Aimi Idzwan

    Published 2007
    “…The programmed that has been used in this project is MATLAB, which provides a high level computing language and interactive environment for algorithm development, data visualization, data analysis and numerical analysis. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Uncertainty estimation for improving accuracy of non-rigid registration in cardiac images by Mazaheri, Samaneh, Sulaiman, Puteri Suhaiza, Wirza, Rahmita, Dimon, Mohd Zamrin, Khalid, Fatimah, Tayebi, Rohollah Moosavi

    Published 2015
    “…In other words, uncertainty estimation is used to evaluate the registration algorithm performance which integrates intensity-based and feature-based methods. …”
    Get full text
    Get full text
    Get full text
    Book Section