Search Results - adoption using different ((extraction algorithm) OR (optimisation algorithm))*

Refine Results
  1. 1

    Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation by Choong, Shin Siang

    Published 2019
    “…In order to explore the solution search space of a combinatorial optimisation problem, an approximation algorithm performs perturbations on the existing solutions by adopting a single or multiple perturbative Low-Level Heuristic(s) (LLHs). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub... by Md. Som, Ayub

    Published 2014
    “…Three simulation works are carried out using three different algorithms so as to refine the performance of the controller. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation by Hossain M.S., Mohd Sidek L.B., Marufuzzaman M., Zawawi M.H.

    Published 2023
    “…The passive congregation theory of natural being's social behaviour is adopted to updated the standard PSO algorithm and used to develop and optimise a reservoir release policy for monthly basis. …”
    Article
  4. 4

    Hybrid genetic algorithm for uncapacitated university examination timetabling problem by Ishak, Suhada

    Published 2015
    “…All proposed algorithms are coded in C using Microsoft Visual C++ 6.0 as the compiler. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, Fakhrud Din, Shah Khalid, Kamal Zuhairi Zamli, Aftab Alam

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, ., Fakhrud, Din, Shah, Khalid, Kamal Z., Zamli, Alam, Aftab

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…The process of embedding and retracting the data cause the original embedded data to be distorted as a side effect of the current method used. Due to the frequently use of rounding approach, embedded data or watermark hidden in an image is retrieved differently from the original watermark (Shih et al, 2004). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm by W. Daud, W. M. Bukhari, Sudirman, Rubita, Omar, Camallil

    Published 2011
    “…Statistically, the results in this study indicate that there are 93% (averages) significance differences in the extracted features of wavelet Scalogram analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abushariah, Mohammad A. M., Hashim, Shaiful Jahari, Hassan Azhari, Abd Rauf

    Published 2015
    “…Once clean Quranic signals are produced, they undergo feature extraction and pattern classification phases. The Mel Frequency Cepstral Coefficients is the most widely used technique for feature extraction and is adopted in this research work, whereas probabilities principal component analysis (PPCA), K-nearest neighbor (KNN) and gaussian mixture model (GMM) are used for pattern classification. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20