Search Results - (( evolution integration selection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…VL-WIDE was also integrated with the solution selection model based on the Analytical Hierarchical Process (AHP) that considers decision-maker preference for the optimized objectives. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…Music that has been generated using JFugue involves real-time generation and user-driven evolution. This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…But issues related to non-optimal algorithm for selecting the appropriate Handover Control Parameters (HCPs) needs further attention. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images by Jamaludin, Shahrizan, Mohamad Ayob, Ahmad Faisal, Mohd Norzeli, Syamimi, Mohamed, Saiful Bahri

    Published 2022
    “…Next, the adaptive initial contour (AIC), δ, and stopping function were integrated to create the adaptive Chan-Vese active contour (ACVAC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Smart agriculture: precision farming through sensor-based crop monitoring and control system by Mohamad Hakhrani, Asyful Azhim, Abdul Hamid, Syamsul Bahrin

    Published 2024
    “…Subsequently, four distinct algorithms are trained with the collected dataset to ascertain the most optimal algorithm for predicting crop growth and harvesting time, resulting in the selection of the Random Forest Regression model, which attains the highest model score of 86%. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application of the Hybrid Artificial Neural Network Coupled with Rolling Mechanism and Grey Model Algorithms for Streamflow Forecasting Over Multiple Time Horizons by Yaseen, Zaher Mundher, Fu, Minglei, Wang, Chen, Mohtar, Wan Hanna Melini Wan, Deo, Ravinesh C., El-Shafie, Ahmed

    Published 2018
    “…The rolling mechanism method is applied to smooth out the dataset based on the antecedent values of the model inputs before being applied to the GM algorithm. The optimization of the input datasets selection was performed using auto-correlation (ACF) and partial auto-correlation (PACF) functions. …”
    Get full text
    Get full text
    Article
  13. 13

    Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids by Fauzun Abdullah Asuhaimi, Muhammad Ali Imran, Shengrong Bu, Joao Pedro Battistella Nadas

    Published 2024
    “…We propose a joint power control and mode selection scheme to deal with the problem and develop a brute-force-based algorithm to find the solutions. …”
    Article
  14. 14

    Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation by Noor Zaihan, Jamal

    Published 2019
    “…In Moreover, the robustness of GWO algorithm is establish with low standard deviation of 1.7142 seconds as compared to BBO. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…Results show that the EFG algorithm produces results that are close in performance with the other ML methods while being highly interpretable, easily integrated into a more comprehensive grammar system and with lower model retraining adaptability time.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid by Khalid, Khairi

    Published 2017
    “…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network script and neural network error checking measures. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance analysis of hybrid renewable energy systems used for rural electrification in Malaysia / Laith Mahmoud Mohammad Halabi by Laith Mahmoud, Mohammad Halabi

    Published 2017
    “…Furthermore, the development of solar radiation prediction algorithms in addition to integrating a flexible hybrid renewable energy design are presented. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis