Search Results - adoption over different ((optimisation algorithm) OR (optimization algorithm))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of two matheuristics for production-inventory-distribution routing problem / Dicky Lim Teik Kyee by Dicky Lim , Teik Kyee

    Published 2018
    “…Whilst in MatHeuristic2, we adopt a slightly different approach. The algorithm starts with the pre-processing stage where the routes are determined to act as input to the MIP in Phase 1. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic control of flotation process using computer vision by Saravani, Ali Jahed

    Published 2015
    “…Bubble size distribution which is regarded as the most important characteristics of froth structure, is being addressed in this thesis by using a segmentation algorithm. A marker based watershed algorithm had been adopted and improved so as to prevent the over segmentation of big bubbles and able to adapt itself with different scenario of froth images. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud by Shariff, S. Sarifah Radiah, Hud, Hady

    Published 2023
    “…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. Every algorithm makes its own respective prior assumptions about the relationships between the features and target variables, which create different types and levels of bias. …”
    Get full text
    Get full text
    Book Section
  7. 7
  8. 8

    Designing substitution boxes based on chaotic map and globalized firefly algorithm by Ahmed, Hussam Alddin Shihab

    Published 2019
    “…This thesis aim to provide a new design for 8 × 8 S-boxes based on firefly algorithm (FA) optimization. The FA is a newly developed metaheuristic algorithm inspired by fireflies and their flash lighting process. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid by Abdul Hamid, Zulkiffli

    Published 2013
    “…At first, in producing a good optimization algorithm, a hybridization technique was proposed for adopting the finest features of two different algorithms; namely the Genetic Algorithm (GA) and continuous domain Ant Colony Optimization (ACOr). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid by Abdul Hamid, Zulkiffli

    Published 2013
    “…At first, in producing a good optimization algorithm, a hybridization technique was proposed for adopting the finest features of two different algorithms; namely the Genetic Algorithm (GA) and continuous domain Ant Colony Optimization (ACOr). …”
    Get full text
    Get full text
    Thesis
  11. 11

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Over the past short time, network security facing a lot of challenges. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Temporal integration based factorization to improve prediction accuracy of collaborative filtering by Al-Qasem, Al-Hadi Ismail Ahmed

    Published 2016
    “…The TemporalMF++ approach relies on the k-means algorithm and the bacterial foraging optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    The Impact of Starting Positions and Breathing Rhythms on Cardiopulmonary Stress and Post-Exercise Oxygen Consumption after High-Intensity Metabolic Training: A Randomized Crossove... by Li, Yuanyuan, Wang, Jiarong, Li, Yuanning, Li, Dandan

    Published 2024
    “…Results: Under free breathing, only the maximum POCR differed significantly between standing and prone positions, with prone positions showing higher stress (mean difference = 3.15, p < 0.001). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Control of polystyrene batch reactors using neural network based model predictive control (NNMPC): an experimental investigation by Hosen, M.A., Hussain, Mohd Azlan, Mjalli, F.S.

    Published 2011
    “…In this approach, a neural network model is trained to predict the future process response over the specified horizon. The predictions are passed to a numerical optimization routine which attempts to minimize a specified cost function to calculate a suitable control signal at each sample instant. …”
    Get full text
    Get full text
    Article
  16. 16

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…Simulation results show that the proposed PF-SUS-SIR clustering algorithm significantly improves user fairness with at least 38.96% over conventional SUS-SIR clustering algorithm while maintaining the total system throughput (near maximum). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…The analysis threshold represents a natural-sorted input vector as Z-rot coefficient (RZ) corresponds to the number of cutting accomplish a strong correlation (R2 = 0.8511) over wear evolution. The clustering system adopted a new calculation of initial centroids has successfully determined the three regions for only a single assignment and achieving the optimal distance squared through eight given data sets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An approach to modelling and simulating multithreaded schedulers for divide and conquer problems on multicore architecture / Alaa Mohammed Ali Wadi Al-Obaidi by Alaa Mohammed, Ali Wadi Al-Obaidi

    Published 2016
    “…The first type is responsible for creating, dividing, and manipulating the threads of the Divide and Conquer algorithms. The second type of schedulers is for balancing the threads using different rebalancing strategies. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-criteria divisible load scheduling in binary tree network by Ghanbari, Shamsollah

    Published 2016
    “…., they do not cheat the algorithm. In the real applications, the processors may cheat the algorithm, which means, the processors might not report their true computation or communication rates. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Performance Modeling And Size Optimization Of A Standalone Photovoltaic System by Abdul Qayoom, Jakhrani

    Published 2013
    “…The proposed optimal sizing method determines the required PV array area and battery storage capacity for the system load with least possible cost and predefined power reliability.The results of the adopted models and developed sizing method were validated by conducting sensitivity analysis of model parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis