Search Results - (( wave optimization based algorithm ) OR ( parameter detection using algorithm ))

Refine Results
  1. 1

    Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook by Liu, Kit Fook

    Published 2017
    “…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm by Nallagownden, P., Alhaj, H.M.M., Sarwar, M.B.

    Published 2015
    “…This paper, describes a method to maximize the pneumatic system efficiency using optimization technique based on Genetic algorithm. This method involves an extraction of maximum incident wave energy corresponding to the wave height, determining of the best deep water length and maximizing the applied damping ratio which can lead to an increase in the pneumatic system efficiency. …”
    Get full text
    Get full text
    Article
  4. 4

    Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model by Kaur, Arvinder, Kumar, Yugal

    Published 2021
    “…In the proposed diagnostic model, a water wave optimization (WWO) algorithm was implemented for improving the diagnosis accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  8. 8

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  9. 9

    Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction by Alqushaibi, A., Abdulkadir, S.J., Rais, H.M., Al-Tashi, Q., Ragab, M.G., Alhussian, H.

    Published 2021
    “…Therefore, the wind plays an essential role in the oceanic atmosphere and contributes to the formation of waves. This paper proposes an enhanced weight-optimized neural network based on Sine Cosine Algorithm (SCA) to accurately predict the wave height. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…Genetic Algorithm (GA) is used to search for the best parameter of SVM classification by using combination of random and pre-populated genomes from Pre-Populated Database (PPD). …”
    Conference Paper
  19. 19

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…Meanwhile, SL-Satari/Di, CL-Satari/Di, and AL-Satari/Di algorithms are recommended to be used for large sample sizes since these algorithms perform very well in detecting the outliers and have low masking and swamping effect at any percentage of outliers and concentration parameter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…Optimization algorithms such as genetic algorithm (GA), particle swarm optimization (PSO) algorithm , ant colony algorithm, and many other algorithms are used along with classifiers to improve the work of these classifiers in detecting intrusion and to increase the performance of these classifiers. …”
    Get full text
    Get full text
    Get full text
    Article