Search Results - (( co integration method algorithm ) OR ( using function based algorithm ))

Refine Results
  1. 1

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Quantum Inspired Computational Intelligence Techniques for Combined Economic Emission Dispatch Problem by MAHDI, FAHAD PARVEZ

    Published 2017
    “…Quantum computing phenomenon is integrated with swarm intelligence-based PSO and bat algorithm (BA) to make these algorithms computationally more powerful and robust.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Integrated framework with association analysis for gene selection in microarray data classification by Ong, Huey Fang

    Published 2011
    “…However, most of the existing gene selection methods are statistical analyses and purely based on gene expression values in the identification of differentially expressed genes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient by Soleimani, Hojjatollah

    Published 2010
    “…The sensor was studied based on the calculation of reflection coefficient using an integral admittance approach and Method of Moment (MOM). …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A single measurement of combined direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…The signal from the sensor is then applied for power switching devices of the PO buckboost converter by the attained maximum power point current from CoDID MPPT method……”
    Get full text
    Get full text
    Book Section
  8. 8

    Variable order step size algorithm for solving second order ODEs by Rasedee, Ahmad Fadly Nurullah, Abdul Sathar, Mohamad Hassan, Wong, Tze Ji, Koo, Lee Feng

    Published 2019
    “…Previous multi step method using a divided difference formulation for solving higher order ordinary differential equations (ODEs) requires calculating the integration co-efficients at every step. …”
    Get full text
    Get full text
    Book Section
  9. 9
  10. 10

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A Newton Cooperative Genetic Algorithm Method for In Silico Optimization of Metabolic Pathway Production by Mohd Arfian, Ismail, Safaai, Deris, Mohd Saberi, Mohamad, Afnizanfaizal, Abdullah

    Published 2015
    “…The NCGA used Newton method in dealing with the metabolic pathway, and then integrated genetic algorithm and cooperative co-evolutionary algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Carbon dioxide management for product supply chain and total site utilisation and storage by Mohd Nawi, Wan Norlinda Roshana

    Published 2018
    “…An algebraic approach called CO2 utilisation and storage-problem table algorithm is proposed to obtain total site target for integration of CO2 utilisation and storage. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20