Search Results - (( data evaluation system algorithm ) OR ( based optimization method algorithm ))*

Refine Results
  1. 1

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…Across all experiments, the IAOA-based method demonstrated superior performance compared to AOA and other methods, including a hybrid approach combining the average multi-verse optimizer and sine cosine algorithm, particle swarm optimizer, the sine cosine algorithm, multi-verse optimizer and grey wolf optimizer. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…In the sizing of the SAPV system, the mutation adaptive DE (MADE) algorithm based multi-objective functions minimizes three constraint objective functions. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An improved marine predators algorithm tuned data-driven multiple-node hormone regulation neuroendocrine-PID controller for multi-input–multi-output gantry crane system by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali, M Osman, Tokhi

    Published 2023
    “…Comparative findings alongside other existing metaheuristic-based algorithms confirmed excellence of the proposed method through its superior performance against the conventional MPA, particle swarm optimization (PSO), grey wolf optimizer (GWO), moth-flame optimization (MFO), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), salp-swarm algorithm (SSA), slime mould algorithm (SMA), flow direction algorithm (FDA), and the formally published adaptive safe experimentation dynamics (ASED)-based methods.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Data-driven PID controller of wind turbine systems using safe experimentation dynamics algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali, Mohd Helmi, Suid, Mohd Zaidi, Mohd Tumari

    Published 2024
    “…These results underscore the efficacy of the SEDA method in providing optimal PID control parameters while reducing computational burdens by 52% compared to other multi-agent optimization-based methods.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…Implementing real-time data updates through cloud-based platforms could further improve system scalability. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman by Isman, Muhammad Iskandar

    Published 2017
    “…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimization of RFID network planning using MDB-FA method by Elewe, Adel Muhsin, Hasnan, Khalid, Nawawi, Azli

    Published 2017
    “…The generated data are utilized as an input representation to apply into firefly algorithm based on Density-Based Algorithm (DBSCAN) to find the optimal network solution. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Prediction of UPSR Result using clonal selection algorithm (PUR) / Muhammed Khaleeq Shafii by Shafii, Muhammed Khaleeq

    Published 2012
    “…This system inspired from Immune System based on virus insert into body. …”
    Get full text
    Get full text
    Thesis
  15. 15

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  16. 16

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Evaluation of Search Result of Document Search Based GA (DSEGA) by Kamal Norfarid, Kamaruddin

    Published 2004
    “…The finding of research is and evaluation of DSeGA system search result. It was discovered that DSeGA system cannot performed the way that the system should be. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm by Mohd Tumari, Mohd Zaidi Mohd, Mustapha, Nik Mohd Zaitul Akmal, Ahmad, Mohd Ashraf, Saat, Shahrizal, Ghazali, Mohd Riduwan

    Published 2023
    “…Thus, this research paper proposed the development of a data-driven fractional-order PID controller based on marine predators algorithm (MPA) for liquid slosh suppression system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item