Search Results - (( using optimization based algorithm ) OR ( user computing learning algorithm ))*
Search alternatives:
- computing learning »
- learning algorithm »
- user computing »
-
1
Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building
Published 2023“…To address the optimization problem, the Evolutionary Mating Algorithm (EMA) is proposed. EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Hybrid Henry Gas-Harris Hawks comprehensive-opposition algorithm for task scheduling in cloud computing
Published 2025“…Users can use online data computing services and computational resources from a distance in cloud computing environments. …”
Get full text
Get full text
Get full text
Article -
3
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
Get full text
Get full text
Article -
4
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
Get full text
Get full text
Thesis -
5
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024Proceedings Paper -
6
A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network
Published 2016“…Simulation results show convergence, learning and adaptability of the RL based algorithms to dynamic environment toward achieving the optimal solutions. …”
Get full text
Get full text
Thesis -
7
-
8
A malicious URLs detection system using optimization and machine learning classifiers
Published 2020“…The bio-inspired algorithm: particle swarm optimization (PSO) is used to optimized URLs features. …”
Get full text
Get full text
Get full text
Article -
9
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Energy consumption optimization in the smart homes
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
11
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
13
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This project research will present the PMCC Heatmap to choose the optimal attributes for using machine learning to detect cryptojacking in order to utilise machine learning to detect embedded malware. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. …”
Proceedings Paper -
15
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023“…We believe that with the reuse of past cases for solving new problems, new framework users will be able to dramatically improve their software development performance. The use of rule-based reasoning and genetic algorithms will optimize the case search and case adaptation process. �2008 IEEE.…”
Conference Paper -
16
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…This research focuses on the utility of Multiagent Learning framework with Deep Reinforcement Learning (MAL-DRL) which is used for solution deployment concerning resource allocation in such systems, such that the end user enjoys optimization while operators optimize resource utilization. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…This research focuses on the utility of Multiagent Learning framework with Deep Reinforcement Learning (MAL-DRL) which is used for solution deployment concerning resource allocation in such systems, such that the end user enjoys optimization while operators optimize resource utilization. …”
Get full text
Get full text
Conference or Workshop Item -
18
BCLH2Pro: a novel computational tools approach for hydrogen production prediction via machine learning in biomass chemical looping processes
Published 2024“…The study proposes an integrated Fe2O3-based ฺBCLpro combining steam gasification for H2 production. …”
Get full text
Get full text
Get full text
Article -
19
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
20
Simple quantum circuit for pattern recognition based on nearest mean classifier
Published 2016“…Lett. 114, 140504 (2015)] which uses quantum matrix inverse algorithm to find optimal hyperplane that separated two different classes. …”
Get full text
Get full text
Article
