Search Results - (( development training optimisation algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Optimization of Feeder Bus Routes for Electric Train Service using Ant Colony Algorithm by Yung, Dellon Tan Tzet

    Published 2014
    “…Hence, to achieve this, various optimisation algorithm needs to be studied and researched. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Development of energy storage system for storing regenerative braking energy from train by Faizal Zamani, Dollah

    Published 2022
    “…ETrax software is used for dynamic load flow simulations to obtain an accurate estimation of the energy recovery captured in the system in each operation mode by incorporating train headway interval variations, algorithm and the effects of train schedules on the operating mode.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    elopment of Neural Network Model for Predicting Crucial Product Properties or Yield for Optimisation of Refinery Operation by Mohamad, Sharliza

    Published 2005
    “…The project methodologies used are literature research and computer modeling using MATLAB neural network toolbox. The framework development for neural network modeling include aspects such as process understanding, data collection and division, input elements selection, data preprocessing, network type selection, design of network architecture, learning algorithm selection, network training, and network simulation using new data set. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An optimization method of genetic algorithm for lssvm in medium term electricity price forecasting by Abdul Razak I.A.W., Abidin I.Z., Siah Y.K., Abidin A.A.Z., Rahman T.K.A., Baharin N., Jali H.B.

    Published 2023
    “…This is due to the limited historical data for training and testing purposes. Therefore, an optimisation technique of Genetic Algorithm (GA) for Least Square Support Vector Machine (LSSVM) was developed in this study to provide an accurate electricity price forecast with optimised LSSVM parameters and input features. …”
    Article
  11. 11

    A performance comparison study of pattern recognition systems for volatile organic compounds detection / Emilia Noorsal, Muhammad Khusairi Osman and Norfadzilah Mokhtar by Noorsal, Emilia, Osman, Muhammad Khusairi, Mokhtar, Norfadzilah

    Published 2007
    “…The performance of each neural network was analysed in terms of the classification accuracy, average score, total training time required during the training process and the test time of the optimised networks. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning by Ismail, Amelia Ritahani, Azhary, Muhammad Zulhazmi Rafiqi, Hitam, Nor Azizah

    Published 2025
    “…Choosing a suitable optimization algorithm in deep learning is essential for effective model development as it significantly influences convergence speed, model performance, and the success of the train- ing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks by Farah Liyana, Azizan, Saratha, Sathasivam, Majid Khan, Majahar Ali, Nurshazneem, Roslan, Caicai, Feng

    Published 2023
    “…First, we included fuzzy logic into the system to make the bipolar structure change to continuous while keeping its logic structure. Then, a Genetic Algorithm is employed to optimise the solution. Finally, we return the answer to its initial bipolar form by casting it into the framework of the hybrid function between the two procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control by Tuan Abdul Rahman, Tuan Ahmad Zahidi, As'arry, Azizan, Abdul Jalil, Nawal Aswan, Raja Ahmad, Raja Mohd Kamil

    Published 2019
    “…Considering both convergence rate and result accuracy simultaneously, the chaotic modified SFS algorithm performs significantly better than other training algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis