Search Results - (((((bath OR baru) algorithm) OR (_ algorithm))) OR (based algorithm))

Refine Results
  1. 1

    Neural network based model predictive control for a steel pickling process by Kittisupakorn, P., Thitiyasook, P., Hussain, Mohd Azlan, Daosud, W.

    Published 2009
    “…The Levenberg-Marquardt algorithm is used to train the process models. In the control (MPC) algorithm, the feedforward neural network models are used to predict the state variables over a prediction horizon within the model predictive control algorithm for searching the optimal control actions via sequential quadratic programming. …”
    Get full text
    Get full text
    Article
  2. 2

    An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title by Khalaf, Emad Taha

    Published 2019
    “…It uses a weighted K-means clustering algorithm based on the improved FA to optimize the initial clustering centers of K-means algorithm, known as Weighted K-means clustering-Improved Firefly Algorithm (WKIFA). …”
    Get full text
    Get full text
    Thesis
  3. 3

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks by Abusnaina, Ahmed A. A.

    Published 2015
    “…The major objective of this thesis is to achieve better performance in terms of convergence training time and classification accuracy for pattern classification by proposing new supervised training methods for Artificial Neural Networks (ANN) based on the MWO algorithm. Increasing the performance, especially in terms of classification accuracy led to an adapted version of the MWO; known as Enhanced-MWO (E-MWO) algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    ZOT -Mk: A New Algorithm For Big Integer Multiplication by Jahani, Shahram

    Published 2009
    “…This research focuses on big number multiplication algorithm that is based on the symbols extracted from the binary numbering system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture by Eessa, Mohammed F.

    Published 2015
    “…The theme of this thesis is based on the utilisation of features of the parallel model in the design phase of an algorithm in order to reduce the computational complexity in comparison with the serial algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Methodology for modified whale optimization algorithm for solving appliances scheduling problem by Omar, Mohd Faizal, Mohd Bakeri, Noorhadila, Mohd Nawi, Mohd Nasrun, Hairani, Norfazlirda, Khalid, Khalizul

    Published 2020
    “…Whale Optimization Algorithm (WOA) is considered as one of the newest metaheuristic algorithms to be used for solving a type of NP-hard problems. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of adaptive controlled natural gas transmission water bath heater using mathematical model / Amiruddin Amkaromi by Amkaromi, Amiruddin

    Published 2018
    “…The thermal process theory provides a way to obtain the process model of the water bath heater mathematically. An adaptive set point regulation algorithm and the model reference are prepared to work with Proportional Integral Derivative (PID) controller in basic Labview programming platform. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Danger theory inspired artificial immune system for pattern recognition by Chung Seng Kheau, Rayner Alfred, Lau, Hui Keng, Jason Teo, Mohd. Hanafi Ahmad Hijazi, Nurul'alam Mohd. Yaakub

    Published 2007
    “…However, as immunology evolves, a theory, the Danger Theory (On, suggested that immune system reacts towards danger signals rather than self and non-self discrimination. Based on ongoing initiatives in outlining OT algorithm, this research evaluates the performance of OT against NS algorithm within pattern recognition domain. …”
    Get full text
    Get full text
    Research Report
  14. 14

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…In this research, algorithms involving palm print feature processing are evaluated so as to obtain optimum time and memory consumption. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Analysis of Large In-Plane Displacement and Strain in Rubber Using 2-D Scanner-Based Digital Image Correlation by Goh, Ching Pang

    Published 2017
    “…The axial strains obtained by using the proposed single-step 2-D SB-DIC algorithm were compared with those obtained using the conventional incremental image correlation algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Metaheuristic Optimization of Perovskite Solar Cell Using Hybrid L32 Taguchi Doe-Based Genetic Algorithm by Kaharudin K.E., Jalaludin N.A., Salehuddin F., Arith F., Mohd Zain A.S., Ahmad I., Mat Junos S.A., Apte P.R.

    Published 2025
    “…The proposed approach is realized using Solar Cell Capacitance Simulator (SCAPS-1D) software incorporated with a hybrid L32 Taguchi DoE-based Genetic Algorithm. Based on Multiple Linear Regression (MLR) analysis, the thickness of mix halide perovskite (CH3NH3PbI3-XClX) was discovered to be the most crucial input parameter affecting the Power Conversion Efficiency (PCE) variations. …”
    Article
  17. 17

    Metaheuristic optimization of perovskite solar cell using hybrid L₃₂ Taguchi DoE-based genetic algorithm by Salehuddin, Fauziyah, Ahmad Jalaludin, Nabilah, Kaharudin, Khairil Ezwan, Arith, Faiz, Mohd Zain, Anis Suhaila, Md Junos@Yunus, Siti Aisah, R Apte, Prakash

    Published 2024
    “…The proposed approach is realized using Solar Cell Capacitance Simulator (SCAPS-1D) software incorporated with a hybrid L32 Taguchi DoE-based Genetic Algorithm. Based on Multiple Linear Regression (MLR) analysis, the thickness of mix halide perovskite (CH3NH3PbI3-XClX) was discovered to be the most crucial input parameter affecting the Power Conversion Efficiency (PCE) variations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    The Development And Evaluation Of Personalized Learning Material Based On A Profiling Algorithm For Polytechnic Students In Learning Algebra by Mohamed Mokmin, Nur Azlina

    Published 2016
    “…The recommendation is computed using a Case-based Reasoning (CBR) algorithm by finding the similarity between the new submitted profile and the stored profiles in the database. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Pair Bonds In Genetic Algorithm by Lim , Ting Yee

    Published 2015
    “…This work presents a comprehensive investigation on the concept of pair bonds (monogamous pairs) for the mating phase of genetic algorithms (GAs). GA is a heuristic search technique based on the principles and mechanisms of natural selection. …”
    Get full text
    Get full text
    Thesis