Search Results - (( using optimization based algorithm ) OR ( using action process algorithm ))

Refine Results
  1. 1

    Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller by Ismail, H. Muh Yusuf

    Published 2010
    “…This study investigates the use of Genetic Algorithms (GA) to design and implement of Fuzzy Logic Controllers (FLC). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Effects of Different Superpixel Algorithms on Interactive Segmentations by Soo See, Chai, Luong Goh, Kok, Weng Ng, Giap, Muzaffar, Hamzah

    Published 2022
    “…In this study, five different types of superpixels ranging from watershed, density, graph, clustering and energy optimization categories are evaluated. The superpixels generated by these five algorithms will be used on two interactive image segmentation algorithms: i) Maximal Similarity based Region Merging (MSRM) and ii) Graph-Based Manifold Ranking (GBMR) with single and multiple strokes on various images from the Berkeley image dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Motion target detection and tracking are among the most important computer vision areas that use advanced image processing techniques. To accomplish the purpose of tracking a target, traditional approaches first perform the detection process and then track the target. …”
    Get full text
    Get full text
    Article
  5. 5

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Using Classifier-based attribute subset selection will reduce more attributes, but sacrifice the performance of the classifier.A hybrid ant colony optimization with simulated annealing algorithm to discover rules from data is proposed.The simulated annealing technique will minimize the problem of low quality discovered rule by an ant in a colony.The best rule for a colony will then be chosen and later the best rule among the colonies will be included in the rule set.The best rule for a colony will then be chosen and later the best rule among the colonies will be included in the rule set.The rule set is arranged in decreasing order of generation.Thirteen data sets which consist of discrete and continuous data were used to evaluate the performance of the proposed algorithm in terms of accuracy, number of rules and number of terms in the rules.Experimental results obtained from the proposed algorithm are comparable to the results of the Ant-Miner algorithm in terms of rule accuracy but are better in terms of rule simplicity.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Neural network based model predictive control for a steel pickling process by Kittisupakorn, P., Thitiyasook, P., Hussain, Mohd Azlan, Daosud, W.

    Published 2009
    “…The Levenberg-Marquardt algorithm is used to train the process models. In the control (MPC) algorithm, the feedforward neural network models are used to predict the state variables over a prediction horizon within the model predictive control algorithm for searching the optimal control actions via sequential quadratic programming. …”
    Get full text
    Get full text
    Article
  7. 7

    Temperature control of a pilot plant reactor system using a genetic algorithm model‐based control approach by Wahab, Ahmad Khairi Abdul, Hussain, Mohd Azlan, Omer, Rosli

    Published 2007
    “…The work described in this paper aims at exploring the use of an artificial intelligence technique, i.e. genetic algorithm (GA), for designing an optimal model-based controller to regulate the temperature of a reactor. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…Using the same hardware configuration, the different algorithms produced different outcomes on the output of the controller. …”
    Conference paper
  15. 15

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…Potential actions must be taken based on prior experiences using a trial and error process. …”
    Get full text
    Get full text
    Monograph
  16. 16

    HELM based Reinforcement Learning for Goal Localization by AlDahoul, Nouar, Htike@Muhammad Yusof, Zaw Zaw

    Published 2016
    “…Hierarchical Extreme Learning Machine (H-ELM) algorithm was used to find good features for effective representation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Design of field programmable gate array-based proportional-integral-derivative fuzzy logic controller with tunable ganin by Obaid, Zeyad Assi

    Published 2010
    “…PIDFC is designed using VHDL language for implementation on FPGA device, and to employ the improved fuzzy algorithm that offer higher processing speed versus low utilization of chip resource. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimal Maintenance Scheduling for Multi-Component E-Manufacturing System by Arab, Ali

    Published 2009
    “…Then, using genetic algorithm-based software which is called SimRunner and has been embedded by ProModel, the scheduling optimization procedure is run to find optimum maintenance schedule. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of Fuzzy Multi-Criteria Analysis Method for Tender Cleaning Service Selection by Aminudin, Nurul Bazlaa’

    Published 2017
    “…The subjective assessment process is model using fuzzy number and linguistic terms. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Discovering optimal features using static analysis and a genetic search based method for Android malware detection by Ahmad Firdaus, Zainal Abidin, Nor Badrul, Anuar, Ahmad, Karim, Mohd Faizal, Ab Razak

    Published 2018
    “…With this in mind, security practitioners have conducted static and dynamic analyses to identify malware. In this study, we used static analysis because of its overall code coverage, low resource consumption, and rapid processing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article