Search Results - parallel generation ((learning algorithm) OR (clustering algorithm))

Search alternatives:

Refine Results
  1. 1

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…Parallel power loads anomalies are processed by a fast-density peak clustering technique that capitalizes on the hybrid strengths of Canopy and K-means algorithms all within Apache Mahout's distributed machine-learning environment. …”
    Article
  2. 2

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Parallelization of prime number generation using message passing interface by I.A., Aziz, N.S., Haron, T.J., Low, R., Wan, D., Wan

    Published 2008
    “…In this research, we propose a parallel processing algorithm that runs on cluster architecture suitable for prime number generation. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults by Zakari, Abubakar, Lee, Sai Peck, Targio Hashem, Ibrahim Abaker

    Published 2019
    “…In an ideal case, faults are isolated into fault-focused clusters, each targeting a single fault for developers to localize them simultaneously in parallel. …”
    Get full text
    Get full text
    Article
  7. 7

    The visualization of three dimensional brain tumors' growth on distributed parallel computer systems by Alias, Norma, Masseri, Mohd. Ikhwan Safa, Islam, Md. Rajibul, Khalid, Siti Nurhidayah

    Published 2009
    “…A comparison of sequential and parallel algorithm will be discussed and this study will address the major issues of the parallel computers performance in terms of efficiency, effectiveness, speedup, and temporality.…”
    Get full text
    Get full text
    Article
  8. 8

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…Addressing these OBL limitations, this research proposes a new general OBL technique inspired by a natural phenomenon of parallel mirrors systems called the Parallel Mirrors Technique (PMT). …”
    Get full text
    Get full text
    Thesis
  9. 9

    PMT: opposition-based learning technique for enhancing meta-heuristic performance by Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…Addressing these issues, this research proposes a new general opposition-based learning (OBL) technique inspired by a natural phenomenon of parallel mirrors systems called the parallel mirrors technique (PMT). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Design and analysis of management platform based on financial big data by Chen, Yuhua, Mustafa, Hasri, Zhang, Xuandong, Liu, Jing

    Published 2023
    “…In addition, a financial data management platform based on distributed Hadoop architecture is designed, which combines MapReduce framework with the fuzzy clustering algorithm and the local outlier factor (LOF) algorithm, and uses MapReduce to operate in parallel with the two algorithms, thus improving the performance of the algorithm and the accuracy of the algorithm, and helping to improve the operational efficiency of enterprise financial data processing. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A study of the high-performance computing parallelism in solving complexity of meteorology data and calculations by Noor Affendi, Mohd Ridhuan, Hussin, Masnida, Hasan, Dana

    Published 2024
    “…Our investigation elaborates on, identifies, and analyzes the features and characteristics of parallel computing that are utilized in it. The paper also focuses on examining parallelization modeling, the algorithms involved, and optimization strategies employed in HPC-enabled meteorological simulations. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The incorporation of a single parallel hidden layer feed-forward neural network to the Fast Learning Network (FLN) architecture gave rise to the improved Extreme Learning Machine (ELM). …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Adaptive genetic algorithm to improve negotiation process by agents e-commerce by Ebadi, Sahar

    Published 2011
    “…The proposed negotiation algorithm employs Bayesian learning and similarity functions in order to predict opponent agent’s type and preferences. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16
  17. 17

    Auxiliary-based extension of multi-tasking sequence-to-sequence model for chatbot answers by Palasundram, Kulothunkan

    Published 2021
    “…“MTL-BC” executes response generation and binary question-response categorization in parallel. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…Total rules number, rules length and rules accuracy for the generation rules are recorded. The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah

    Published 2013
    “…The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A review on security and privacy issues in E-learning and the MapReduce aproach by Noor Akma, Abu Bakar, Mazlina, Abdul Majid, Khalid, Adam, Kirahman, Ab Razak, Noorhuzaimi@Karimah, Mohd Noor

    Published 2019
    “…Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
    Get full text
    Get full text
    Get full text
    Article