Search Results - (( knowledge evolution optimization algorithm ) OR ( java effective connection algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2

    Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing by Lim, Shun Hoe, Teo, Jason Tze Wi

    Published 2015
    “…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic design, optimization and In-Situ Fabrication of Heterogeneous Swarm Robot bodies using 3-D printing and multi-objective evolutionary algorithms by Teo, Jason Tze Wi, Johnny Koh, Chin, Kim On, Chua, Bih Lii, Willey Liew, Noor Ajian Mohd. Lair, Lim, Shun Hoe

    Published 2012
    “…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
    Get full text
    Get full text
    Research Report
  6. 6

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Logic mining method via hybrid discrete hopfield neural network by Guo, Yueling, Mohd Kasihmuddin, Mohd Shareduwan, Zamri, Nur Ezlin, Li, Jia, Romli, Nurul Atiqah, Mansor, Mohd Asyraf, Ruzai, Wan Nur Aqlili

    Published 2025
    “…The first contribution involves the incorporation of a Hybrid Differential Evolution Algorithm to accelerate the optimization of synaptic weights during the training phase. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of a robust intelligent controller for a semi-active car suspension system by Abas, Hesham Ahmed Abdul Mutleba

    Published 2022
    “…Commonly, the Fuzzy rules are optimized using offline optimization methods such as Differential Evolutionary (DE), Particle Swarms Optimization (PSO), or Artificial Neural Network (ANN) algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Therefore, the first problem to be tackled is the privacy optimization of Modbus/TCP packet fields. In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimizing Neural Network Prediction of Composite Fatigue Life Under Variable Amplitude Loading Using Bayesian Regularization by Megat-Yusoff, Puteri Sri Melor

    Published 2009
    “…Compiling information from diverse sources, Composite Materials Technology: Neural Network Applications fills the void in knowledge of these important networks, covering composite mechanics, materials characterization, product design, and other important aspects of polymer matrix composites. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. The PLSR architecture model, workflow and algorithms are described. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  15. 15

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The experimental results show that predictive FDT algorithm can generate a relatively optimal tree without much computation effort (comprehensibility), and WFPRs have a better predictive accuracy of stock market time series data. …”
    Get full text
    Get full text
    Article
  16. 16

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Finally, to improve the evaluation of the reliability, the approaches of using MAS for connection of probability with the reliability fuzzy model is proposed. …”
    Get full text
    Get full text
    Thesis