Search Results - (( parallel optimisation based algorithm ) OR ( using combination using algorithm ))
Search alternatives:
- parallel optimisation »
- optimisation based »
- combination using »
- using algorithm »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
2
Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm
Published 2024“…Therefore, this paper aims to obtain optimum conditions of ethe nd milling process for three cutting inserts with multi-objective parameters using a combination of mathematical modelling and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016“…The results of this research are important in developing a routing algorithm for CHR6o3.…”
Get full text
Get full text
Conference or Workshop Item -
4
A Simulated Annealing-Based Hyper-Heuristic For The Flexible Job Shop Scheduling Problem
Published 2023“…Flexible job shop scheduling problem (FJSP) is a common optimisation problem in the industry. The use of parallel machines allows an operation to be executed on a machine assigned from a set of alternative machines, raising a combination of machine assignment and job sequencing sub-problems. …”
Get full text
Get full text
Thesis -
5
Tool path generation of contour parallel based on ant colony optimisation
Published 2016“…The optimisation of tool path length based on ACO algorithm ascertained that the cutting tool remove the uncut line once and able to eliminate the uncut region in the shortest tool path length. …”
Get full text
Get full text
Article -
6
-
7
-
8
-
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
10
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
11
To study the performance of stemming algorithm on Malay words beginning with the letter "S" / Rohana Jantan
Published 2000“…This algorithm is used in the Malay language document that is used is the Quran translated document. …”
Get full text
Get full text
Thesis -
12
An Experimental Study Of Combinational Logic Circuit Minimization Using Firefly Algorithm
Published 2014“…Combinatorial logic circuit minimization is usualy done using Karnaugh’s Map or Bolean equation. This paper presents an aplication of Firefly Algorithm to design combinational logic circuit in which the objective function is to minimize the total number of gates used. …”
Get full text
Get full text
Article -
13
Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus
Published 2000“…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
Get full text
Get full text
Thesis -
14
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
15
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…This involves the use of two combinations simultaneously such as the pair combination of prefix-suffix-prefix suffix-infix as primary combinations and prefix suffix-suffix-prefix-infix as the secondary. …”
Get full text
Get full text
Thesis -
16
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…The performance of this Malay stemming algorithm is tested using translated Quran documents and Malay dictionary. …”
Get full text
Get full text
Thesis -
17
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
19
Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz
Published 2013“…Therefore, we proposed a shape recognition algorithm using similarity measurement combining Jaccard and Mahalanobis distance is used to measure the similarity between geometry shape sketches. …”
Get full text
Get full text
Thesis -
20
Committee neural networks with fuzzy genetic algorithm.
Published 2011“…There are different ways of combining the intelligent systems' outputs in the combiner in the committee neural network, such as simple averaging, gating network, stacking, support vector machine, and genetic algorithm. …”
Get full text
Get full text
Get full text
Article
