Search Results - (( user computing data algorithm ) OR ( using optimization model algorithm ))

Refine Results
  1. 1

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
    Get full text
    Get full text
    Article
  2. 2

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…Innovative cloud computing system offers cutting-edge storage models that prioritize the importance of data, adaptive algorithms for controlling data flow, and cost-effective computational procedures. …”
    Conference paper
  3. 3

    Simulation and Visualization of TSP Using Ant Colony Optimization by Tri Basuki, Kurniawan, Misinem, ., Astried, ., Joan Angelina, Widians

    Published 2023
    “…This study aims to simulate and visualize the TSP by developing a software simulation model. This model can be used to explain how to solve the traveling salesman problem by providing step-by-step instructions performed by users using ant colony optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…Everyday, more contents related to social media are generated by social media users (e.g., Facebook, Twitter). As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The aim of this study is to optimize the demand response of solar energy generation using Genetic Algorithm (GA) to minimize the daily yield loss caused by load shedding. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…The MTS algorithm is coded in ANSI-C language and tested on benchmark data from Mandl's Swiss Network and Mumford's larger data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…The algorithm undergoes rigorous training with a vast dataset to ensure high prediction accuracy and reliability. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modeling And Control Of V-Groove Rotary Impact Driver by Leong, Chi Hoe

    Published 2020
    “…The speed is optimized by using state-flow algorithm with fixed-point data types, thus reduced hardware computational requirement with acceptable accuracy. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Resource allocation technique for powerline network using a modified shuffled frog-leaping algorithm by Altrad, Abdallah Mahmoud Mousa

    Published 2018
    “…The main goal of this work is to develop a conceptual framework and mathematical model for resource allocation using Shuffled Frog-Leap Algorithm (SFLA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…Increasing data traffic has exposed the need for multi-user multi-antenna wireless communication systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An Intelligent Process Model for Manufacturing System Optimization by Ho , Kok Hoe, Kanesan , Muthusamy, Harikrishnan , Kanthen

    Published 2012
    “…The model sets inventory target variable to be achieved with automated computation through the data input from users. …”
    Get full text
    Article
  13. 13

    Predicting next page access by Markov models and association rules on web log data by Chimphlee, S., Salim, N., B. Ngadiman, M. S., Chimphlee, W., Srinoy, S.

    Published 2006
    “…This algorithm has been used to cluster Web site with similar transition behaviors and compares the transition matrix to an optimal size for efficient used to further improve the efficiency of prediction. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…Furthermore, a random forest model is used in this study's machine learning classification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning by Abuzaraida, Mustafa Ali, A. L. gaud, Sarah, Abrahim Hneish, Hamza, Attarbashi, Zainab

    Published 2026
    “…Using the YOLOv8 algorithm, a model was trained to detect and track the state of coffee in real time. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Forecasting sunspot numbers with Feedforward Neural Networks (FNN) using 'sunspot neural forecaster' system by Reza Ezuan, Samin, Muhammad Salihin, Saealal, Azme, Khamis, Syahirbanun, Isa, Ruhaila, Md. Kasmani

    Published 2011
    “…Feedforward Neural Network will be used in this investigation by using different learning algorithms, sunspot data models and FNN transfer functions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Analysis and decentralised optimal flow control of heterogeneous computer communication network models by Ku-Mahamud, Ku Ruhana

    Published 1993
    “…General closed queueing networks are used to model the local flow control in multiclass computer communication networks with single and multiple transmission links. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Menu Planning Model for Malaysian Boarding School Using Self-Adaptive Hybrid Genetic Algorithms by Siti Noor Asyikin, Mohd Razali

    Published 2011
    “…Finally, the present study has developed a menu planning prototype for caterers to provide healthy and nutritious daily meals using simple and fhendly user interface.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Wearables-assisted smart health monitoring for sleep quality prediction using optimal deep learning by Hamza, Manar Ahmed, Hassan Abdalla Hashim, Aisha, Alsolai, Hadeel, Gaddah, Abdulbaset, Othman, Mahmoud, Yaseen, Ishfaq, Rizwanullah, Mohammed, Zamani, Abu Sarwar

    Published 2023
    “…For sleep quality prediction, the WSHMSQP-ODL model uses the deep belief network (DBN) model. To enhance the sleep quality prediction performance of the DBN model, the enhanced seagull optimization (ESGO) algorithm is used for hyperparameter tuning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The implementation of the four features is described as follows: Firstly, the SCBEH model, which optimized a MONA benchmark model and absorbed all its security technologies, has four aspects to be considered: 1) the use of symmetric and asymmetric hybrid encryption technique (KEM-DEM), in which the latest elliptic curve cryptography algorithm (ECC) of asymmetric encryption is used; 2) the applications of group key distribution and group signature technologies are achieved; 3) the revocation and tracking of illegal group members are reimplemented; 4) the computational burden of client is alleviated. …”
    Get full text
    Get full text
    Get full text
    Thesis