Search Results - (( using solution learning algorithm ) OR ( variable generation based algorithm ))

Refine Results
  1. 1

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…While the firefly algorithm solution is superior, it has a higher time complexity compared to other algorithms used when there are more hidden layers and neurons. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Additionally, the research restricts the number of variables through feature selection to enhance the performance of the algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation by Muslim, Farah Kamil Abid

    Published 2017
    “…Finally, the last objective is to improve the optimality of the new approach using a robust Machine Learning strategy. An adaptive neuro-fuzzy inference system (ANFIS) was designed which constructs and optimizes a fuzzy logic controller using a given dataset of input/output variables in order for the mobile robot to learn. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, the generated stego signature (s) is used to make stego key (k) based on the zero-distortion approach to represent the secret message (m) in a binary format. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Operational matrix based on orthogonal polynomials and artificial neural networks methods for solving fractal-fractional differential equations by Shloof, Aml Melad Asan

    Published 2024
    “…Initially, the algorithm utilized a truncated series. The values of the unknown coefficients in this truncated power series were then determined using an optimization technique to minimize the criterion function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    LINGUISTIC FUZZY MODELING IN LASER MACHINING QUALITY EVALUATION by Sivarao, Subramonian

    Published 2007
    “…The aim of this scientific research is to design knowledge based linguistic rules, algorithm, architecture & learning ability and further develop fuzzy model for laser machining kerf edge quality prediction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of robust procedures for partial least square regression with application to near infrared spectral data by Silalahi, Divo Dharma

    Published 2021
    “…To address these problems, robust nonlinear solutions of PLSR are developed through kernel based learning by nonlinearly projecting the original input data matrix to a high dimensional feature mapping corresponding to the kernel space. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  12. 12

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…This thesis presents the design and implementation of a new interaction test generation strategy, known as the Particle Swarm-based Test Generator (PSTG), for generating t-way and variable-strength test suites. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A variable combinatorial test suite strategy based on modified greedy algorithm by Homaid, Ameen A. Ba, Alsewari, Abdulrahman A.

    Published 2015
    “…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…Moreover, experiments demonstrate that final clustering solution generated by the proposed incremental genetic-based clustering ensemble algorithm using the pattern ensemble learning method possess comparative or better clustering accuracy than clustering solutions generated by the incremental genetic-based clustering ensemble algorithms using other recombination operators. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…To generate test cases that satisfy MC/DC criterion, many researchers adopt neighborhood based meta-heuristics algorithms (including that of Simulated Annealing and Hill Climbing) as the problem itself is neighborhood based. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Maximizing power generation in variable speed micro-hydro with power point tracking by Min Keng Tan, Norafe Maximo Javinez, Kit Guan Lim, Ahmad Razani Haron, Pungut Ibrahim, Kenneth Tze Kin Teo

    Published 2022
    “…As such, this paper aims to explore and develop a feasible maximum power point tracker (MPPT) with perturb and observe (P&O) and genetic algorithm (GA) in providing optimal power generation for variable speed micro-hydro system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings