Search Results - (( development growth optimisation algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency by Ramli, Muhammad Shahrul Azwan, Zainal Abidin, Mohamad Shukri, Hasan, Nor Shahida, Md Reba, Mohd Nadzri, Kolawole, Keshinro Kazeem, Ardiansyah, Rizqi Andry, Mpuhus, Sikudhan Lucas

    Published 2024
    “…This study presents a Reinforcement Learning-based algorithm designed to optimise irrigation for Durio Zibethinus (i.e., durian) trees, aiming to maximise tree growth and reduce water usage. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic by Sa'ad, Suleiman, Abdullah, Muhammed, Abdullah, Azizol, Ayob, Fahrul Hakim

    Published 2022
    “…In the past few years nature-inspired algorithms are experiencing rapid growth where most optimisation problems in different domains are addressed using it. …”
    Get full text
    Get full text
    Article
  4. 4

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Optimisation of fed-batch fermentation process using deep reinforcement learning by Chai, Wan Ying

    Published 2023
    “…In conclusion, a deep reinforcement learning algorithm was successfully developed for the substrate feeding rate optimisation in the fed-batch baker’s yeast fermentation process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A non-dominated sorting differential search algorithm flux balance analysis (ndsDSAFBA) for in silico multiobjective optimization in identifying reactions knockout by Kauthar, Mohd Daud, Mohd Saberi, Mohamad, Zalmiyah, Zakaria, Rohayanti, Hassan, Zuraini, Ali Shah, Safaai, Deris, Zuwairie, Ibrahim, Suhaimi, Napis, Sinnott, Richard O.

    Published 2019
    “…In this work, a method, termed ndsDSAFBA (non-dominated sorting Differential Search Algorithm and Flux Balance Analysis), has been developed to find the reaction knockouts involved in maximising the production rate and growth rate of the mutant, by incorporating Pareto dominance concepts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A non-dominated sorting Differential Search Algorithm Flux Balance Analysis (ndsDSAFBA) for in silico multiobjective optimization in identifying reactions knockout by Mohd Daud, Kauthar, Mohamad, Mohd Saberi, Zakaria, Zalmiyah, Hassan, Rohayanti, Ali Shah, Zuraini, Deris, Safa'ai, Ibrahim, Zuwairie, Napis, Suhaimi, Sinnott, Richard O.

    Published 2019
    “…In this work, a method, termed ndsDSAFBA (non-dominated sorting Differential Search Algorithm and Flux Balance Analysis), has been developed to find the reaction knockouts involved in maximising the production rate and growth rate of the mutant, by incorporating Pareto dominance concepts. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optimisation and control of fed-batch yeast production using q-learning by Helen, Chuo Sin Ee

    Published 2013
    “…To cater for the process disturbance, Q-learning with exploration (QLE) has been included in this work for online optimisation. QLE signifies the importance of exploration from time to time based on the developed “past experience” in Q-table to optimise the process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Modeling water pH neutralisation behaviour in a small-scale hydroponic system using the NARX-PSO model / Mohammad Farid Saaid by Saaid, Mohammad Farid

    Published 2022
    “…Nutrients are essential to optimising plant growth. However, the introduction of fertiliser affects the pH level of the nutrient solution. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Predicting YSPSAH's product preferences across department of private hospitals by Abd Malik, Nur Aisyah Syahirah

    Published 2025
    “…This leads to inconsistent stocking, inefficient procurement, and missed optimisation opportunities. This project aimed to develop a predictive model to forecast departmental product preferences and the addition is to identify the crossselling product opportunities using Market Basket Analysis (MBA). …”
    Get full text
    Get full text
    Student Project
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…Furthermore, cloud computing technology and association rule mining as the core technology based on analysis of domestic and foreign research. In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  18. 18
  19. 19

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis