Search Results - (( using optimization based algorithm ) OR ( user computing learning algorithm ))*

Refine Results
  1. 1

    Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2023
    “…To address the optimization problem, the Evolutionary Mating Algorithm (EMA) is proposed. EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Hybrid Henry Gas-Harris Hawks comprehensive-opposition algorithm for task scheduling in cloud computing by Omran Alkaam, Nora, Md Sultan, Abu Bakar, Hussin, Masnida, Yatim Sharif, Khaironi

    Published 2025
    “…Users can use online data computing services and computational resources from a distance in cloud computing environments. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Article
  4. 4

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A reinforcement learning-based energy-efficient spectrum-aware clustering algorithm for cognitive radio wireless sensor network by Mustapha, Ibrahim

    Published 2016
    “…Simulation results show convergence, learning and adaptability of the RL based algorithms to dynamic environment toward achieving the optimal solutions. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…This project research will present the PMCC Heatmap to choose the optimal attributes for using machine learning to detect cryptojacking in order to utilise machine learning to detect embedded malware. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Designing a New Model for Worm Response Using Security Metrics by Madihah Mohd Saudi, Taib, BM

    Published 2024
    “…Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. …”
    Proceedings Paper
  15. 15

    Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design by Jani H.M., Lee S.P.

    Published 2023
    “…We believe that with the reuse of past cases for solving new problems, new framework users will be able to dramatically improve their software development performance. The use of rule-based reasoning and genetic algorithms will optimize the case search and case adaptation process. �2008 IEEE.…”
    Conference Paper
  16. 16

    Deep reinforcement learning based resource allocation strategy in cloud-edge computing system by Ahmed Adhoni, Zameer, Habelalmateen, Mohammed, DR Janardhana, DR Janardhana, Abdul Sattar, Khalid Nazim, Audah, Lukman

    Published 2024
    “…This research focuses on the utility of Multiagent Learning framework with Deep Reinforcement Learning (MAL-DRL) which is used for solution deployment concerning resource allocation in such systems, such that the end user enjoys optimization while operators optimize resource utilization. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Deep reinforcement learning based resource allocation strategy in cloud-edge computing system by Ahmed Adhoni, Zameer, Habelalmateen, Mohammed I, D R, Janardhana, Abdul Sattar, Khalid Nazim, Audah, Lukman

    Published 2024
    “…This research focuses on the utility of Multiagent Learning framework with Deep Reinforcement Learning (MAL-DRL) which is used for solution deployment concerning resource allocation in such systems, such that the end user enjoys optimization while operators optimize resource utilization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    text::Thesis
  20. 20

    Simple quantum circuit for pattern recognition based on nearest mean classifier by Mahmoud Ahmed, Gharib Subhi, Messikh Azeddine, Azeddine

    Published 2016
    “…Lett. 114, 140504 (2015)] which uses quantum matrix inverse algorithm to find optimal hyperplane that separated two different classes. …”
    Get full text
    Get full text
    Article