Search Results - (( developing online optimisation algorithm ) OR ( java pattern classification algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Optimisation and control of fed-batch yeast production using q-learning by Helen, Chuo Sin Ee

    Published 2013
    “…To cater for the process disturbance, Q-learning with exploration (QLE) has been included in this work for online optimisation. QLE signifies the importance of exploration from time to time based on the developed “past experience” in Q-table to optimise the process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function by Tan, Min Keng

    Published 2019
    “…This study aims to explore the potential of implementing multi-agent-based Genetic Algorithm (GA) with interactive metamodel to acquire regular optimisation on dynamic characteristic of traffic flow. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  12. 12