Search Results - (( framework segmentation learning algorithm ) OR ( parameter optimisation based algorithm ))

Refine Results
  1. 1

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…Optimisation is difficult to optimise as there are three parameters that need to be tuned, Kp, Integral parameter, Ki, and derivative parameter, Kd. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Mixed-variable ant colony optimisation algorithm for feature subset selection and tuning support vector machine parameter by Alwan, Hiba Basim, Ku-Mahamud, Ku Ruhana

    Published 2017
    “…This paper presents a hybrid classification algorithm, ACOMV-SVM which is based on ant colony and support vector machine.A new direction for ant colony optimisation is to optimise mixed (discrete and continuous) variables.The optimised variables are then feed into selecting feature subset and tuning its parameters are two main problems of SVM.Most approaches related to tuning support vector machine parameters will discretise the continuous value of the parameters which will give a negative effect on the performance. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Enhanced Deep Learning Framework for Fine-Grained Segmentation of Fashion and Apparel by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…This work proposes a deep learning framework that can learn how to detect and segment clothing objects accurately. …”
    Get full text
    Get full text
    Article
  6. 6

    Single-Solution Simulated Kalman Filter Algorithm for Global Optimisation Problems by Nor Hidayati, Abdul Aziz, Zuwairie, Ibrahim, Nor Azlina, Ab. Aziz, Mohd Saberi, Mohamad, Watada, Junzo

    Published 2016
    “…In comparison, the proposed ssSKF algorithm supersedes the original population-based Simulated Kalman Filter (SKF) algorithm by operating with only a single agent, and having less parameters to be tuned. …”
    Get full text
    Get full text
    Article
  7. 7

    Single-solution Simulated Kalman Filter algorithm for global optimisation problems by Abdul Aziz, N.H., Ibrahim, Z., Ab Aziz, N.A., Mohamad, M.S., Watada, J.

    Published 2018
    “…In comparison, the proposed ssSKF algorithm supersedes the original population-based Simulated Kalman Filter (SKF) algorithm by operating with only a single agent, and having less parameters to be tuned. …”
    Get full text
    Get full text
    Article
  8. 8

    Single-solution Simulated Kalman Filter algorithm for global optimisation problems by Abdul Aziz, N.H., Ibrahim, Z., Ab Aziz, N.A., Mohamad, M.S., Watada, J.

    Published 2018
    “…In comparison, the proposed ssSKF algorithm supersedes the original population-based Simulated Kalman Filter (SKF) algorithm by operating with only a single agent, and having less parameters to be tuned. …”
    Get full text
    Get full text
    Article
  9. 9

    Sustainable Management Of River Water Quality Using Artificial Intelligence Optimisation Algorithms by Chia, See Leng

    Published 2021
    “…Least Square Support Vector Machine (LSSVM) base models with linear kernel, polynomial kernel and Radial Basis Function (RBF) kernel and its hybrid models with integration of Hybrid of Particle Swarm Optimisation and Genetic Algorithm (HPSOGA), Whale Optimisation Algorithm based on Self-adapting Parameter Adjustment and Mix Mutation Strategy (SMWOA) and Ameliorative Moth Flame Optimisation (AMFO) were developed and used to predict the WQI at stations 1K06, 1K07 and 1K08 of the Klang River in Selangor, Malaysia. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…The modified graph clustering ant colony optimisation (MGCACO) algorithm is an effective FS method that was developed based on grouping the highly correlated features. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Augmented model based double iterative loop techniques for integrated system optimisation and parameter estimation of large scale industrial processes by Normah Abdullah, Brdys, M.A., Roberts, P.D.

    Published 1993
    “…The double iterative loop structures of the proposed algorithms use the real process measurement within the outer loops while the inner loops involve model based computation only. …”
    Get full text
    Get full text
    Article
  13. 13

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A Reinforcement Learning Based Adaptive ROI Generation for Video Object Segmentation by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…The primary focus of the current deep learning-based models is to learn the discriminative representations in the foreground over motion and appearance in small-term temporal segments. …”
    Get full text
    Get full text
    Article
  16. 16

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
    Get full text
    Get full text
    Thesis
  17. 17

    2TSS: Two-tier semantic segmentation framework with enhancement for hotspot detection of solar photovoltaic thermal images by Nurul Huda, Ishak, Iza Sazanita, Isa, Muhammad Khusairi, Osman, Mohd Shawal, Jadin, Kamarulazhar, Daud, Mohd Zulhamdy, Ab Hamid

    Published 2025
    “…The proposed method is designed with two subsequent stages of segmentation models, including image pre-processing at the initial of the framework. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An elitist-flower pollination-based strategy for constructing sequence and sequence-less t-way test suite by Abdullah, Nasser, Kamal Z., Zamli, Alsewari, Abdulrahman A., Ahmed, Bestoun S.

    Published 2018
    “…In line with the upcoming of a new field called search-based software engineering (SBSE), many newly developed t-way strategies adopting meta-heuristic algorithms can be seen in the literature for constructing interaction test suite (such as simulated annealing (SA), genetic algorithm (GA), ant colony optimisation algorithm (ACO), particle swarm optimisation (PSO), harmony search (HS) and cuckoo search (CS). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Impact of Balanced Exploration and Exploitation on High-dimensional Feature Selection with Hierarchical Whale Optimisation Algorithm by Yab, Li Yu, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2024
    “…The HiWOA incorporates a two-phase strategy comprising a nonlinear control parameter based on the arcsine function and a hierarchical position-update mechanism adapted from the Grey Wolf Optimiser. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article