Search Results - (( based application usage algorithm ) OR ( data optimization method algorithm ))

Refine Results
  1. 1

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Later, an algorithm combining both Genetic Algorithm and Discrete Cosine Transform was proposed, which shows the step-by-step sequence of both methods. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Bayesian Framework based Brain Source Localization Using High SNR EEG Data by Jatoi, M.A., Kamel, N., Gaho, A.A., Dharejo, F.A.

    Published 2019
    “…This research work discusses the results based on synthetically generated EEG data at an SNR level of 12 dB with Gaussian noise added linearly in data matrix. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…The first scheme is a SensorAnt, which is a self-optimization mechanism for WSN. It is able to utilize and optimize the sensor nodes’ resources, especially the batteries, to achieve balanced energy consumption across all sensor nodes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection by Alsmadi, Issa Mohammad Ibrahim

    Published 2018
    “…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
    Get full text
    Get full text
    Thesis
  6. 6

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Muhammad Salihin, Saealal, Mohd Mawardi, Saari, Abu Zaharin, Ahmad

    Published 2024
    “…The methodology involves comparing KAN's performance with Artificial Neural Networks (NN) and a hybrid metaheuristic algorithm combined with deep learning, namely the Teaching-Learning-Based Optimization with Deep Learning (TLBO-DL). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building by Sulaiman, Mohd Herwan, Mustaffa, Zuriani, Saealal, Muhammad Salihin, Saari, Mohd Mawardi, Ahmad, Abu Zaharin

    Published 2024
    “…The methodology involves comparing KAN’s performance with Artificial Neural Networks (NN) and a hybrid metaheuristic algorithm combined with deep learning, namely the Teaching-Learning-Based Optimization with Deep Learning (TLBO-DL). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…They are mostly used in compressors, fans and pumps, but their usage has progressed to a much advanced level such as, aircrafts, space shuttles and military applications. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  18. 18

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…These two models are based on topological placement method. DM is optimized using genetic algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…The Transformer model with transferred weights outperformed models trained from scratch using supervised learning. To select the optimal hyperparameters for the Transformer model, the Tree Parzen Estimator(TPE) optimization in combination with the Hyperband pruning algorithm is employed to search for the best combination that yields the lowest Root Mean Squared Error(RMSE)and Mean Absolute Error (MAE) error metrics. …”
    text::Thesis