Search Results - (( simulation optimization mining algorithm ) OR ( code classification tree algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Comparative analysis for topic classification in juz Al-Baqarah by Rahman, Mohamad Izzuddin, Samsudin, Noor Azah, Mustapha, Aida, Abdullahi Oyekunle, Adeleke

    Published 2018
    “…The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Metaheuristic optimization of perovskite solar cell performance using Taguchi grey relational analysis with grey wolf optimizer by Salehuddin, Fauziyah, Mat Junos @ Yunus, Siti Aisah, Ahmad Jalaludin, Nabilah, Mohd Nazli, Nurul Farina, Arith, Faiz, Mohd Zain, Anis Suhaila, Mohamd Rafidi, Nur Ruzanna, Kaharudin, Khairil Ezwan

    Published 2025
    “…The metaheuristic approach sequentially employs the L27 orthogonal array (OA) Taguchi-based design of experiment (DoE), Grey Relational Analysis (GRA), Multiple Linear Regression (MLR) and Grey Wolf Optimizer (GWO). The L27 OA Taguchi-based DoE is initially employed to mine sufficient output data simulated using one dimensional solar cell capacitance simulator (SCAPS-1D). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…As for future work, the plan is to convert the code to an app to run on the smartphone so it can be commercialized.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia by Lay, Usman Salihu

    Published 2019
    “…The general objective of the study was the development of optimized hybrid debris flow models using airborne laser scanning data and Machine learning algorithms in Malaysia. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Modeling of CO emissions from traffic vehicles using artificial neural networks by Al-Gbur, Omer Saud Azeez, Pradhan, Biswajeet, Mohd Shafri, Helmi Zulhaidi, Shukla, Nagesh, Lee, Chang Wook, Rizeei, Hossein Mojaddadi

    Published 2019
    “…The hybrid model was developed based on the integration of GIS and the optimized Artificial Neural Network algorithm that combined with the Correlation based Feature Selection (CFS) algorithm to predict the daily vehicular CO emissions and generate prediction maps at a microscale level in a small urban area by using a field survey and open source data, which are the main contributions to this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Dynamic investment model for the restructed power market in the presence of wind source by Esfahani, Mohammad Tolou Askari Sedehi

    Published 2014
    “…In the third step, the long term optimal investment strategies of the hybrid wind-thermal investor are determined based on the dynamic programming algorithm by considering the long term states of demand growth and fuel price uncertainties. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Blockchain-enabled cybersecurity framework for healthcare domain by Islam, Md Shohidul

    Published 2025
    “…This framework revealed the optimal performance in terms of mining health data size, average response time, transaction latency, and throughput for secured block transactions in blockchain networks by doing a simulation-based comparative study with the existing work. …”
    Get full text
    Get full text
    Thesis