Search Results - (( data distribution using algorithm ) OR ( _ selection search algorithm ))

Refine Results
  1. 1

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The static filter range selection algorithm uses a fixed filter range approach to locate the target key, in which the filter range is preset at the beginning of the searching process. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Note that the 18-bus system is originally without any capacitor. Two selection methods that are used in Genetic Algorithm are the roulette wheel and tournament selections. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Furthermore, the isolation line is tested on different section and load factor to recognize the improvement of optimal distribution network performance. These output data are analysed to present the optimal prediction output of service restoration using Cuckoo Search Spring – Least Square Support Vector Machine (CSS-LSSVM). …”
    Get full text
    Get full text
    Thesis
  4. 4

    The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool by Stapa @ Mustapa, Muhamad Azhar

    Published 2008
    “…The implementation was tested and evaluated on universal datasets using GridSim 4.1. Tabu Search has been selected for its efficiency in distributing jobs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…A set of data contains position of marbles is tested for ACO algorithm in the prototype. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  9. 9

    A novel approach to data mining using simplified swarm optimization by Wahid, Noorhaniza

    Published 2011
    “…However, existing traditional data classification and feature selection techniques used in data management are no longer enough for such massive data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection by Alsmadi, Issa Mohammad Ibrahim

    Published 2018
    “…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In order to train Ridgelet probabilistic neural network, a modified differential evolution algorithm with new mutation phase, crossover process, and selection mechanism is introduced. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A systematic literature review on outlier detection in wireless sensor networks by Safaei, Mahmood, Asadi, Shahla, Driss, Maha, Boulila, Wadii, Alsaeedi, Abdullah, Chizari, Hassan, Abdullah, Rusli, Safaei, Mitra

    Published 2020
    “…Therefore, an efficient local/distributed data processing algorithm is needed to ensure: (1) the extraction of precise and reliable values from noisy readings; (2) the detection of anomalies from data reported by sensors; and (3) the identification of outlier sensors in a WSN. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems by Ary, Maxsi

    Published 2025
    “…The hybridisation mechanism combines the global exploration strength of GWO, the solution refinement capability of SOS, and the effective path construction of ACO into an integrated search strategy. The algorithm was first developed and tested using a standard benchmark dataset (Dantzig42), which was selected due to its standard usage in VRP research and its suitability for performance comparison owing to its structured complexity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…The sort–merge–join algorithm sorts the datasets on the joining attribute and then searches for tuples by merging the two datasets. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The segmentation process was optimized using Fuzzy-based Segmentation Parameter. Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-based service search and selection algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-qased service search and selection algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…Overall, the developed algorithms have similar PSNR value and lower average search point compared to superior algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis