Search Results - (( using optimization method algorithm ) OR ( sequence identification method algorithm ))

Refine Results
  1. 1

    Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues by Aisyah, Yunus, Norfilza, Mohd Mokhtar, Raja Affendi, Raja Ali *, Siti Maryam, Ahmad Kendong, Hajar, Fauzan Ahmad

    Published 2024
    “…•Application of machine learning algorithms to the identification of potential mycobiome biomarkers for non-invasive colorectal cancer screening. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    DNA motif identification using LPBS by Harun, Hazaruddin, Syed Abdullah, Sharifah Lailee, Hambali, Hamirul ’Aini

    Published 2016
    “…The results show that the LPBS algorithm is able to discover motifs of a species when using DNA sequences from the same fragment of COI.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…The features are reduced using the particle swarm optimization detection technique in video image sequences to reduce the computational complexity. …”
    Get full text
    Get full text
    Article
  4. 4

    Direct Adaptive Predictive Control For Wastewater Treatment Plant by Shair, Ezreen Farina, Abu Bakar, Norazhar, Mohd Nor, Arfah Syahida, Mohd Azam, Sazuan Nazrah, Mohd Sobran, Nur Maisarah, Zainal Abidin, Amar Faiz

    Published 2012
    “…The adaptive control structure is based on the linear model of the process and combined with numerical algorithm for subspace state space system identification (N4SID). …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…First, to investigate the methods used to address limitations associated with microbiome-based datasets in colorectal cancer identification using deep neural network algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Kalman filter based impedance parameter estimation for transmission line and distribution line by Siti Nur Aishah, Mohd Amin

    Published 2019
    “…Most of the current algorithms for parameter identification are based on the assumption that transmission line is fully transposed and the corresponding components are symmetric. …”
    Get full text
    Get full text
    Thesis
  11. 11

    SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS by SETYO WIBOWO, TRI CHANDRA

    Published 2009
    “…The subspace system identification method is used to estimate the linear model parameters. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    AR oriented pose matching mechanism from motion capture data by Iqbal J., Sidhu M.S., Ariff M.B.M.

    Published 2023
    “…This proposed algorithm is compared with other published methods in terms of frame level accuracy and learning time of dance session. …”
    Article
  14. 14

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Wind farm reactive power optimization by using imperialist competitive algorithm by Soheilirad, Mohammadsoroush, Hizam, Hashim, Farzan, Payam, Hojabri, Mojgan, Fallah, Seyedeh Narjes, Soheilirad, G.

    Published 2013
    “…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE by Paknahad, M., Hosseini, P., Hakim, S.J.S

    Published 2023
    “…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
    Get full text
    Get full text
    Article
  20. 20

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
    Get full text
    Get full text
    Thesis