Search Results - (( developing function learning algorithm ) OR ( based implementation drops algorithm ))

Refine Results
  1. 1

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…The Whale Optimisation Algorithm (WOA), Harris Hawks Optimisation (HHO) Algorithm, Lévy Flight WOA (LFWOA) and the Opposition-Based Learning of HHO (OBL-HHO) were proposed to simulate the initial model’s response and optimise the Klang Gate Dam (KGD) release operation with observed inflow, water level (storage), release, and evaporation rate (loss). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Experimental implementation controlled SPWM inverter based harmony search algorithm by Najeeb, Mushtaq, Mansor, Muhamad, Razali, Ramdan, Daniyal, Hamdan, A. F. Yahaya, Jabbar

    Published 2017
    “…Based on the output results, the proposed voltage controller using HS algorithm based PI (HS-PI) showed that the inverter output performance is improved in terms of voltage amplitude, robustness, and convergence rate speed as compared to PSO algorithm based PI (PSO-PI). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…This eventually brought the study to the implementation of the Inverse Single Drop Multistage (ISDMS)-2D Fuzzy Algorithm on the Mass Transfer of Multiple Drops in Multistage System. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  6. 6

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…A framework for the immune-based technique is discovered in this study. Based on the framework, a prototype was implemented to evaluate the accuracy of the proposed technique. 52% is the highest accuracy obtained from the technique by using ten-fold cross validation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr... by Sammen S.S., Ehteram M., Sheikh Khozani Z., Sidek L.M.

    Published 2024
    “…In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
    Article
  11. 11
  12. 12

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Particle swarm optimization for neural network learning enhancement by Abdull Hamed, Haza Nuzly

    Published 2006
    “…Two programs have been developed; Particle Swarm Optimization Feedforward Neural Network (PSONN) and Genetic Algorithm Backpropagation Neural Network (GANN). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Support directional shifting vector: A direction based machine learning classifier by Kowsher, Md., Hossen, Imran, Tahabilder, Anik, Prottasha, Nusrat Jahan, Habib, Kaiser, Zafril Rizal, M Azmi

    Published 2021
    “…The positional error of the linear function has been modelled as a loss function which is iteratively optimized using the gradient descent algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Evaluation of optimal MLP structure for heart disease diagnosis / Salbiah Ab Hamid by Ab Hamid, Salbiah

    Published 2010
    “…A transfer function simulation model is developed by using the MATLAB software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…An efficient iterative algorithm is developed to optimize the objective function of the proposed algorithm since it is non-smooth and difficult to solve. …”
    Get full text
    Get full text
    Get full text
    Thesis