Search Results - (( evolution optimization clustering algorithm ) OR ( variable deviation detection algorithm ))

Search alternatives:

Refine Results
  1. 1

    A novel clustering based genetic algorithm for route optimization by Aibinu, Abiodun Musa, Salau, Habeeb Bello, Najeeb, Athaur Rahman, Nwohu, Mark Ndubuka, Akachukwu, Chichebe

    Published 2016
    “…It was also observed that the introduction of clustering based selection algorithm guaranteed the selection of cluster with the optimal solution in every generation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm by Vincent Chung, Hamzarul Alif Hamzah, Norah Tuah, Kit, Guan Lim, Min, Keng Tan, Kenneth Tze Kin Teo

    Published 2020
    “…Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  4. 4

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…Nature-inspired optimization-based clustering techniques are powerful, robust and more sophisticated than the conventional clustering methods due to their stochastic and heuristic characteristics. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The optimal results obtained for constrained engineering problems as well as data clustering are very promising in terms of quality of solutions and convergence speed of the algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Descriptive analysis of patient diet trends at Pantai Hospital Ayer Keroh by Muhidin, Nurain Fatiha

    Published 2025
    “…Identifying the clustering results enables targeted meal planning based on patient group characteristics and helps optimize resources by understanding dietary demand within each cluster. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…Further evolution of the ELEC routing protocol is presented to evaluate the impact of incremental cluster iv heads on the performance of WSN. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…Although the scheme was developed based on data of fatty acid precut fractionation column, the algorithm of fault detection and diagnosis can be extended to other chemical process by changing the x-MR chart and HAZOP for each selected monitoring variables.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fault diagnostic advisory system using moving-range chart and hazard operability study. by Heng, Han Yann, Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2007
    “…Fault is considered to occur if one variable is out of control limit. The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
    Get full text
    Get full text
    Article
  12. 12

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  13. 13

    Fault diagnostic advisory system using moving-range chart and hazard operability study by Heng, Han Yann, Ali, Mohamed Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2007
    “…Fault is considered to occur if one variable is out of control limit. The advisory system has successfully detected and diagnosed the deviations and displayed the causes and consequences of the faults. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…Autonomous manufacturing allows the system to distinguish between a mild, normal and total failure in tool condition. K-means clustering has become the most applied algorithm in discovering classes in an unsupervised scenario. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    An adaptive HMM based approach for improving e-Learning methods by Deeb B., Hassan Z., Beseiso M.

    Published 2023
    “…This adaptive algorithm can thus be applied to any e-learning platform for optimal content delivery to its users in real-time. © 2014 IEEE.…”
    Conference Paper
  17. 17

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis