Search Results - (( variable training learning algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…This thesis gives a systematic investigation of various MLP learning mainly Sliding Window (SW) learning mode which is treated as the adaptation of offline algorithms into online application Consequently this thesis reviews various offline algorithms including: batch backpropagation, nonlinear conjugate gradient, limited memory and full-memory Broyden, Fletcher, Goldfarb and Shanno algorithms and different forms of the latest proposed bimary ensemble learning. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Classifications of Multiple Organ Failures in a Malaysian Intensive Care Unit by Shah N.N.H., Razak N.N.A., Razak A.A., Abu-Samah A., Suhaimi F.M., Jamaluddin U.

    Published 2025
    “…The random forest algorithm was able to achieve 99.8% accuracy and 99.9% sensitivity in the training dataset. …”
    Article
  7. 7
  8. 8
  9. 9

    Feasibility analysis for predicting the compressive and tensile strength of concrete using machine learning algorithms by Ziyad Sami B.H., Ziyad Sami B.F., Kumar P., Ahmed A.N., Amieghemen G.E., Sherif M.M., El-Shafie A.

    Published 2024
    “…The model had an impressive performance during the training phase, with a R2 of 0.98, RMSE of 2.412 MPa, and MAE of 1.6249 MPa when using 8 input variables to predict the compressive strength of concrete. …”
    Article
  10. 10

    Reinforcement learning-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage traning by Ahmed Abo Mosali, Najm Addin Mohammed

    Published 2022
    “…Third, the concept of multistage training based on the dynamic variables was proposed as an opposing concept to one-stage combinatory training. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Predicting dengue transmission rates by comparing different machine learning models with vector indices and meteorological data by Ong, Song Quan, Pradeep Isawasan, Ahmad Mohiddin Mohd Ngesom, Hanipah Shahar, As’malia Md Lasim, Gomesh Nair

    Published 2023
    “…Previous work has focused only on specific weather variables and algorithms, and there is still a need for a model that uses more variables and algorithms that have higher performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network by Rahim, Muhammad Fitri

    Published 2012
    “…In this project, an Artificial Neural Network (ANN) trained by the Invasive Weed Optimization (IWO) learning algorithm is proposed for short term load forecasting (STLF) model. …”
    Get full text
    Get full text
    Student Project
  13. 13

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  14. 14
  15. 15

    Genetic ensemble biased ARTMAP method of ECG-Based emotion classification by Loo, C.K., Liew, W.S., Sayeed, M.S.

    Published 2012
    “…The optimal combination of λ and training sequence can be computed efficiently using a genetic permutation algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Utilizing machine learning to predict hospital admissions for pediatric COVID-19 patients (PrepCOVID-Machine) by Chuin-Hen Liew, Song-Quan Ong, David Chun-Ern Ng

    Published 2024
    “…Recursive Feature Elimination (RFE) was employed for feature selection, and we trained seven supervised classifiers. Grid Search was used to optimize the hyperparameters of each algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Machine Learning Based Optimal Design of On-Road Charging Lane for Smart Cities Applications by Shanmugam Y., Narayanamoorthi R., Ramachandaramurthy V.K., Bernat P., Shrestha N., Son J., Williamson S.S.

    Published 2025
    “…The learning algorithms consider variables such as core structure, cross-coupling effect, and coil flux pipe length. …”
    Article
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  20. 20