Search Results - (( data applications usage algorithm ) OR ( based optimization method algorithm ))

Refine Results
  1. 1

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Later, an algorithm combining both Genetic Algorithm and Discrete Cosine Transform was proposed, which shows the step-by-step sequence of both methods. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Bayesian Framework based Brain Source Localization Using High SNR EEG Data by Jatoi, M.A., Kamel, N., Gaho, A.A., Dharejo, F.A.

    Published 2019
    “…This research work discusses the results based on synthetically generated EEG data at an SNR level of 12 dB with Gaussian noise added linearly in data matrix. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…It is based on Ant Colony Optimization (ACO) meta heuristic, which is adopted to enhance the paths with the best-quality function. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection by Alsmadi, Issa Mohammad Ibrahim

    Published 2018
    “…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
    Get full text
    Get full text
    Thesis
  6. 6

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Muhammad Salihin, Saealal, Mohd Mawardi, Saari, Abu Zaharin, Ahmad

    Published 2024
    “…The methodology involves comparing KAN's performance with Artificial Neural Networks (NN) and a hybrid metaheuristic algorithm combined with deep learning, namely the Teaching-Learning-Based Optimization with Deep Learning (TLBO-DL). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building by Sulaiman, Mohd Herwan, Mustaffa, Zuriani, Saealal, Muhammad Salihin, Saari, Mohd Mawardi, Ahmad, Abu Zaharin

    Published 2024
    “…The methodology involves comparing KAN’s performance with Artificial Neural Networks (NN) and a hybrid metaheuristic algorithm combined with deep learning, namely the Teaching-Learning-Based Optimization with Deep Learning (TLBO-DL). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…They are mostly used in compressors, fans and pumps, but their usage has progressed to a much advanced level such as, aircrafts, space shuttles and military applications. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  18. 18

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis