Search Results - (( using function _ algorithm ) OR ( data integration method algorithm ))

Refine Results
  1. 1

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case) by Lytvyn, Oleg M., Nechuiviter, Olesia, Pershyna, Iuliia, Mezhuyev, Vitaliy

    Published 2019
    “…The estimation of proposed method has been done for the Lipschitz class and class of differentiable functions. The proposed formula is based on the algorithm, which is also effective for a class of discontinuous functions.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Constraint preserving mapping algorithm for XML storage by Ahmad, Kamsuriah, Mamat, Ali, Ibrahim, Hamidah, Mohd Noah, Shahrul Azman

    Published 2006
    “…The use of XML as the common format for representing, exchanging, storing, integrating and accessing data poses many new challenges to database systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Benchmarking in silico tools for the functional assessment of DNA variants using a set of strictly pharmacogenetic variants by Chua, Eng Wee, Goh, Chian Siang

    Published 2019
    “…Predictive algorithms are important tools for translating genomic data into meaningful functional annotations. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Modeling time series data using Genetic Algorithm based on Backpropagation Neural network by Haviluddin

    Published 2018
    “…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Parameter-driven count time series models / Nawwal Ahmad Bukhari by Nawwal , Ahmad Bukhari

    Published 2018
    “…Simulation shows that MCEM algorithm and particle method are useful for the parameter estimation of the Poisson model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics by Mohammad Jarrah, Mu'ath Ibrahim

    Published 2018
    “…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A new variant of black hole algorithm based on multi population and levy flight for clustering problem by Haneen Abdul Wahab, Abdul Raheem

    Published 2020
    “…The first modification is the integration of BH algorithm and levy flight, which result in data clustering method, namely “Levy Flight Black Hole (LBH)”. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The aim of this study is to optimize the demand response of solar energy generation using Genetic Algorithm (GA) to minimize the daily yield loss caused by load shedding. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…Data for the study was collected from university records, and algorithm performance was tested against predefined scheduling criteria. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Protection of the digital Holy Quran hash digest by using cryptography algorithms by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, Moh. Jumaah, Bashayer

    Published 2013
    “…Cryptography is the science of information security that includes symmetric encryption and asymmetric encryption which used to avoid the tampering attempts and guarantee the data integrity. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Estimating the total Malaysian road accidents and fatalities using Gauss-Newton method of least squares / Maureen Giman, Siti Zulaikha Muhamad Zuraidi and Syahida Asyikin Moner by Giman, Maureen, Muhamad Zuraidi, Siti Zulaikha, Moner, Syahida Asyikin

    Published 2022
    “…Furthermore, Gauss-Newton method is not commonly used as well. Therefore, the objectives of this study are to determine a function that fits to the Malaysian road accident and fatalities data using Gauss-Newton method. …”
    Get full text
    Get full text
    Student Project
  19. 19

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…Thirdly, the thesis validates the algorithm's performance on standard constrained single objective and multi objective benchmark test functions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…Drawing from an extensive review of existing predictive models and cardiovascular health risk factors, this research proposes an enhanced ADAM optimization algorithm, integrated with advanced data processing and feature selection methodologies, to identify and refine key predictors for improved model performance. …”
    Get full text
    Get full text
    Get full text
    Article