Search Results - (( using optimisation based algorithm ) OR ( data application using algorithm ))

Refine Results
  1. 1

    Sustainable Management Of River Water Quality Using Artificial Intelligence Optimisation Algorithms by Chia, See Leng

    Published 2021
    “…Least Square Support Vector Machine (LSSVM) base models with linear kernel, polynomial kernel and Radial Basis Function (RBF) kernel and its hybrid models with integration of Hybrid of Particle Swarm Optimisation and Genetic Algorithm (HPSOGA), Whale Optimisation Algorithm based on Self-adapting Parameter Adjustment and Mix Mutation Strategy (SMWOA) and Ameliorative Moth Flame Optimisation (AMFO) were developed and used to predict the WQI at stations 1K06, 1K07 and 1K08 of the Klang River in Selangor, Malaysia. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3
  4. 4

    Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm by Muhammad Arif, Abdullah

    Published 2019
    “…Furthermore, a case study was conducted to validate the proposed EE-ASP model and the performance of the optimisation algorithms. The MFO performance was compared with three frequently used meta-heuristics algorithms in ASP, namely Ant Colony Optimisation (ACO), Genetic Algorithm (GA) and Particle Swarm Optimisation (PSO). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…The noise and duplicate data filtering algorithm was constructed based on bloom filter. …”
    Get full text
    Get full text
    Article
  7. 7

    NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali by Hambali, Najidah

    Published 2019
    “…This study proposes a system identification of SDPP using NARX model. The model structure selection of polynomial NARX had been focused on Binary Particle Swarm Optimisation (BPSO) algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fuzzy rank cluster top k Euclidean distance and triangle based algorithm for magnetic field indoor positioning system by Bundak, Caceja Elyca, Abd Rahman, Mohd Amiruddin, Abdul Karim, Muhammad Khalis, Osman, Nurul Huda

    Published 2021
    “…For the proposed fuzzy algorithm, a condition is applied to choose whether the triangle area or average Euclidean algorithm is used to find the final estimated position. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media by Sutranggono, Abi Nizar, Sarno, Riyanarto, Ghozali, Imam

    Published 2024
    “…Overall, the MCML classification algorithm is proven to be used as a benchmark for early detection of text-based mental health disorders.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm by Nurul Aimi Munirah, ., Muhammad Akmal, Remli, Noorlin, Mohd Ali, Hui, Wen Nies, Mohd Saberi, Mohamad, Khairul Nizar Syazwan, Wan Salihin Wong

    Published 2020
    “…Therefore, this paper proposed a Black Widow Optimisation (BWO) algorithm inspired by the bizarre mating behaviour of a spider as the method to use to solve the problem. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    An adaptive ant colony optimization algorithm for rule-based classification by Al-Behadili, Hayder Naser Khraibet

    Published 2020
    “…Ant-Miner is a variant of ant colony optimisation and a prominent intelligent algorithm widely use in rules-based classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20