Search Results - (( program data maximization algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Final examination time table scheduling using integer programming with average time slot gap minimization by Nur Hidayah Abdul Jamil, Nor Aliza Ab Rahmin, Athirah Nawawi

    Published 2024
    “…The algorithm is applied to real data from third-year students of Bachelor of Science in Mathematics with Honours at the Department of Mathematics and Statistics, Faculty Science, UPM during semester 2 session 2021/2022. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Kernel methods and support vector machines for handwriting recognition by Ahmad A.R., Khalid M., Yusof R.

    Published 2023
    “…SVM works by mapping training data for a classification task into a higher dimensional feature space using the kernel function and then finding a maximal margin hyperplane, which separates the mapped data. …”
    Conference paper
  5. 5

    Final examination time table scheduling using integer programming with average time slot gap minimization by Abdul Jamil, Nur Hidayah, Ab Rahmin, Nor Aliza, Nawawi, Athirah

    Published 2024
    “…The algorithm is applied to real data from third-year students of Bachelor of Science in Mathematics with Honours at the Department of Mathematics and Statistics, Faculty Science, UPM during semester 2 session 2021/2022. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…The other two models are bi-objective mixed integer nonlinear programming models with soft time window constraints developed to minimize costs and maximize customer satisfaction under uncertain demand, which include stochastic and fuzzy demand, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems by Ali, Zuhura Juma

    Published 2021
    “…The closed-form solutions are derived using Karush-Kuhn-Tucker (KKT) conditions to maximize the system sum rate and the Dinkelbach (DKL) algorithm to maximize system energy efficiency. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method by Delgoshaei, Aidin

    Published 2016
    “…Then, design of experiments is used to examine the sensitivity of the parameters of each solving algorithm using Taguchi method. Afterward, the proposed solving methods are verified using 17 data sets from the literature and results are analyzed. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Development of optimized maintenance scheduling model for coal-fired power plant boiler by Noor Fazreen Binti Ahmad Fuzi, Ms.

    Published 2023
    “…Literature revealed that mathematical methods and metaheuristic algorithms are common approaches in solving combinatorial optimization problems with a large search space in a reasonable computational run time. …”
    text::Thesis
  17. 17

    Double Deep RL-based strategy for UAV-assisted energy harvesting optimization in disaster-resilient IoT networks by Elmadina, Nahla Nur, Saeed, Rashid A, Saeid, Elsadig, Ali, Elmustafa Sayed, Nafea, Ibtehal, Ahmed, Mayada A, Mokhtar, Rania A, Khalifa, Othman Omran

    Published 2024
    “…We formulate this as a nonlinear programming (NLP) optimization problem, maximizing EH from IoT devices and optimizing UAV trajectories under constraints like mission duration and energy limits. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19

    Public healthcare facility planning in Malaysia : Using location allocation models / S. Sarifah Radiah Shariff by S. Sarifah Radiah, Shariff

    Published 2012
    “…The model is solved using a weighted sum multi objective approach that simultaneously minimizes the average distance traveled (p-median) and maximizes the coverage percentage (MCLP). The data set are used to illustrate the effectiveness of the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors by Pathan, Al-Sakib Khan, Ahmed, Tarem

    Published 2014
    “…Wireless sensor networks (WSN) are emerging as both an important new tier in the IT (information technology) ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security, and social factors [1,2]. …”
    Get full text
    Get full text
    Get full text
    Book Chapter