Search Results - (( evolution identification method algorithm ) OR ( evolution classification rules algorithm ))

Refine Results
  1. 1

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…Experimental results demonstrated the compatibility of the proposed logical rule and the Discrete Hopfield Neural Network. Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Stock market turning points rule-based prediction / Lersak Photong … [et al.] by Photong, Lersak, Sukprasert, Anupong, Boonlua, Sutana, Ampant, Pravi

    Published 2021
    “…Simultaneously, news sentiment analysis techniques were used to discover the polarity of news according to each factor. From news classification and news sentiment, a rule-based algorithm was used to predict the stock market turning points. …”
    Get full text
    Get full text
    Book Section
  4. 4

    Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model by Legowo, Ari

    Published 2012
    “…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq

    Published 2024
    “…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm by Pairan, Mohammad Fahmi, Shamsudin, Syariful Syafiq, Yaakub, Mohd Fauzi

    Published 2024
    “…The paper presents a method for autotuning attitude PID for a quadplane UAV using differential evolution (DE), X-Plane simulation, and neural network (NN)-based system identification. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article
  12. 12

    Email spam classification based on deep learning methods: A review by Tusher, Ekramul Haque, Mohd Arfian, Ismail, Anis Farihan, Mat Raffei

    Published 2025
    “…Email spam is a significant issue confronting both email consumers and providers. The evolution of spam filtering has progressed considerably, transitioning from basic rule-based filters to more sophisticated machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…In addition, the structural parameters of a system can be accurately estimated through the proposed system identification methods for both cases of linear and nonlinear conditions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection by Norfadzlan, Yusup, Izzatul Nabila, Sarbini, Dayang Nurfatimah, Awang Iskandar, Azlan, Mohd Zain, Didik Dwi, Prasetya

    Published 2026
    “…In the experiment, we conducted an evaluation of the effectiveness and efficiency of four nature-inspired binary algorithms for optimization namely Binary Particle Swarm Optimization (BPSO), Binary Grey Wolf Optimization algorithm (BGWO), Binary Differential Evolution algorithm (BDE), and Binary Salp Swarm algorithm (BSS) - in the context of human activity recognition (HAR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…Chapter two provides a detailed lens into the core mechanics, followed by an exploration of the algorithms that drive the matching processes in Chapter Three. …”
    Get full text
    Get full text
    Get full text
    Book