Search Results - (( data estimation bees algorithm ) OR ( parameter detection method algorithm ))

Refine Results
  1. 1
  2. 2

    Parameter estimation of essential amino acids in Arabidopsis thaliana using hybrid of bees algorithm and harmony search by Aw, Mei Yee, Mohd Saberi, Mohamad, Chong, Chuii Khim, Safaai, Deris, Muhammad Akmal, Remli, Mohd Arfian, Ismail, Corchado, Juan Manuel, Omatu, Sigeru

    Published 2019
    “…Global optimization methods can be applied by minimizing the distance between experimental data and predicted models. This paper proposes the Hybrid of Bees Algorithm and Harmony Search (BAHS) to estimate the kinetics parameters of essential amino acid production in the aspartate metabolism for Arabidopsis thaliana. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3

    Acoustic emission partial discharge localization in oil based on artificial bee colony by Lim, Zhi Yang, Azis, Norhafiz, Mohd Hashim, Ahmad Hafiz, Mohd Radzi, Mohd Amran, Norsahperi, Nor Mohd Haziq, Mohd Ariffin, Azrul

    Published 2025
    “…Therefore, the ABC was proposed to estimate the PD location through a colony of 120 bees, evenly divided into 60 employed and 60 onlooker bees. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm by Mohamad Fadzil, Nur Hamisha Helanie

    Published 2025
    “…Future work may focus on integrating real-time data, adjusting algorithm parameters and hybridizing ABC algorithm with other metaheuristics to further improve performance.…”
    Get full text
    Get full text
    Student Project
  5. 5

    Hydroclimatic data prediction using a new ensemble group method of data handling coupled with artificial bee colony algorithm by Basri Badyalina, Nurkhairany Amyra Mokhtar, Nur Amalina Mat Jan, Muhammad Fadhil Marsani, Mohamad Faizal Ramli, Muhammad Majid, Fatin Farazh Ya'acob

    Published 2022
    “…It is rare to find a hydrological application using the group method of data handling (GMDH) model, artificial bee colony (ABC) algorithm, and ensemble technique, precisely predicting ungauged sites. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Improving the modeling capacity of Volterra model using evolutionary computing methods based on Kalman Smoother adaptive filter by ., Edwar Yazid, Mohd Shahir Liew, Setyamartana Parman, Velluruzhati

    Published 2015
    “…The first step is combining the forward and backward estimator in the original Volterra model; the second step is reformulating the Volterra model into a state-space model so that the Kalman Smoother (KS) adaptive filter can be used to estimate the kernel coefficients; the third step is optimization of KS parameters using evolutionary computing algorithms such as particle swarm optimization (PSO), genetic algorithm (GA) and artificial bee colony (ABC). …”
    Get full text
    Get full text
    Article
  18. 18

    SLOW DRIFT MOTIONS IDENTIFICATION OF FLOATING STRUCTURES USING TIME-VARYING INPUT -OUTPUT MODELS by YAZID, EDWAR

    Published 2015
    “…The first step is presenting the backward estimator and combined forward-backward estimator instead of the only forward estimator in the original input-output models; the second step is reformulating the input-output models into a state-space model so that the Kalman Smoother (KS) adaptive filter can be used to estimate the model coefficients; the third step is optimization of KS parameters using evolutionary computing algorithms such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and Artificial Bee Colony (ABC) to form the PSO-KS, GA-KS and ABC-KS as estimation methods.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper