Search Results - (( initial solution methods algorithm ) OR ( using vectorization learning algorithm ))

Refine Results
  1. 1
  2. 2

    Optimizing wavelet neural networks using modified cuckoo search for multi-step ahead chaotic time series prediction by Ong, Pauline, Zainuddin, Zarita

    Published 2019
    “…The resulting solutions from the MCSA are then used as the initial translation vectors for the WNNs. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…To overcome these ANN problems, the Genetic Algorithm (GA) has been most frequently used for this purpose, however, some drawbacks of GA include, slow search speed and dependence on initial parameters. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Study on Abstract Policy for Acceleration of Reinforcement Learning by Ahmad Afif, Mohd Faudzi, Hirotaka, Takano, Junichi, Murata

    Published 2014
    “…In this paper, the authors propose to reuse an abstract policy, a representative of a solution constructed by learning vector quantization (LVQ) algorithm, to improve initial performance of an RL learner in a similar but different problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…In the OGC framework, the exhibited explorative search behavior of the Gravitational Clustering (GC) algorithm has been addressed by (i) eliminating the agent velocity accumulation, and (ii) integrating an initialization method of agents using variance and median to subrogate the exploration process. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr... by Sammen S.S., Ehteram M., Sheikh Khozani Z., Sidek L.M.

    Published 2024
    “…For water level prediction, lagged rainfall and water level are used. In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
    Article
  8. 8

    Support directional shifting vector: A direction based machine learning classifier by Kowsher, Md., Hossen, Imran, Tahabilder, Anik, Prottasha, Nusrat Jahan, Habib, Kaiser, Zafril Rizal, M Azmi

    Published 2021
    “…In this article, we have focused on developing a model of angular nature that performs supervised classification. Here, we have used two shifting vectors named Support Direction Vector (SDV) and Support Origin Vector (SOV) to form a linear function. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
    Article
  10. 10

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An improved algorithm for iris classification by using support vector machine and binary random machine learning by Kamarulzalis, Ahmad Haadzal

    Published 2018
    “…In machine learning, there are three type of learning branch that can used in classification procedures for data mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In addition, experiments prove that incremental genetic-based clustering ensemble algorithm speed up to converge into an optimal clustering solution, where pattern ensemble learning method and the cluster partitions produced by the threshold fuzzy c-means clustering algorithm are employed as recombination operator and initial population, respectively.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Multistage optimal homotopy asymptotic method for solving initial-value problems by Anakira, N. R., Alomari, A. K., Jameela, Ali, Hashim, Ishak

    Published 2016
    “…In this paper, a new approximate analytical algorithm namely multistage optimal homotopy asymptotic method (MOHAM) is presented for the first time to obtain approximate analytical solutions for linear, nonlinear and system of initial value problems (IVPs).This algorithm depends on the standard optimal homotopy asymptotic method (OHAM), in which it is treated as an algorithm in a sequence of subinterval. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20