Search Results - (( data extraction swarm algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Data normalization techniques in swarm-based forecasting models for energy commodity spot price by Yusof, Yuhanis, Mustaffa, Zuriani, Kamaruddin, Siti Sakira

    Published 2014
    “…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Enhanced multi-hop mechanism in vehicular communication system using swarm algorithm by Kit, Guan Lim, Ke Wen Teh, Wen Teh, Min, Keng Tan, Herwansyah Lago, Soo, Siang Yang, Tze, Kenneth Kin Teo

    Published 2021
    “…Vehicular network is modelled in Simulation of Urban Mobility (SUMO) and the algorithm is formulated in MATLAB. Data is extracted from SUMO through Traffic Control Interface for MATLAB (TraCI4Matlab). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Jamaludin, Sallim, Kohbalan, Moorthy

    Published 2021
    “…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…In the next phase, the datasets are optimized using the Salp Swarm Algorithm (SSA), which improves classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10
  11. 11

    NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali by Hambali, Najidah

    Published 2019
    “…The model structure selection of polynomial NARX had been focused on Binary Particle Swarm Optimisation (BPSO) algorithm. The proposed NARX-based BPSO algorithm was implemented for both time-varying water and steam temperature from the SDPP. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Parameter extraction of solar photovoltaic modules using penalty-based differential evolution by Ishaque, K., Salam, Z., Mekhilef, Saad, Shamsudin, A.

    Published 2012
    “…The two diode model of a solar cell is used as the basis for the extraction problem. The analyses carried out using synthetic current-voltage (I-V) data set showed that the proposed P-DE outperforms other Evolutionary Algorithm methods, namely the simulated annealing (SA), genetic algorithm (GA), and particle swarm optimization (PSO). …”
    Get full text
    Get full text
    Article
  13. 13

    A study on the application of discrete curvature feature extraction and optimization algorithms to battery health estimation by Goh, Hui Hwang, An, Zhen, Zhang, Dongdong, Dai, Wei, Kurniawan, Tonni Agustiono, Goh, Kai Chen

    Published 2024
    “…This study employs two optimization algorithms, namely, particle swarm optimization (PSO) and sparrow optimization algorithm (SSA), in conjunction with least squares support vector machine (LSSVM) to compare the model against three conventional models, namely, Gaussian process regression (GPR), convolutional neural networks (CNN), and long short-term memory (LSTM). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
    Get full text
    Get full text
    Book Chapter
  15. 15

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
    Get full text
    Get full text
    Book Chapter
  16. 16

    Estimating Crack Effects on Electrical Characteristics of PV Modules Based on Monitoring Data and I-V Curves by Feng L., Zhang J., Kiong T.S., Ding K., Amin N., Hamelmann F.U.

    Published 2024
    “…This study presents an approach to investigate microcrack effects on the output characteristics of photovoltaic (PV) modules based on a theoretical model that is derived from the equivalent single-diode model through monitoring data and current-voltage (I-V) curves. Meanwhile, an innovative parameter optimization algorithm based on particle swarm optimization is developed to extract the parameters. …”
    Article
  17. 17

    A study on the application of discrete curvature feature extraction and optimization algorithms to battery health estimation by Hui Hwang Goh, Hui Hwang Goh, Zhen An, Zhen An, Dongdong Zhang, Dongdong Zhang, Wei Dai, Wei Dai, Tonni Agustiono Kurniawan, Tonni Agustiono Kurniawan, Kai Chen Goh, Kai Chen Goh

    Published 2024
    “…This study employs two optimization algorithms, namely, particle swarm optimization (PSO) and sparrow optimization algorithm (SSA), in conjunction with least squares support vector machine (LSSVM) to compare the model against three conventional models, namely, Gaussian process regression (GPR), convolutional neural networks (CNN), and long short-term memory (LSTM). …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…The analysis revealed that performance of particle swarm optimization algorithm and Prey predator algorithm are better to use in training the networks. …”
    Get full text
    Get full text
    Thesis