Search Results - (( data optimization method algorithm ) OR ( data applications usage algorithm ))

Refine Results
  1. 1

    Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization by Pang, Jia Hong

    Published 2011
    “…The genetic algorithms is proven to be a very effective method in optimization by using the way imitating natural process of living beings such as crossover, mutation and selection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm by Nejad, Mohsen Fadaee

    Published 2013
    “…Among these methods, Genetic Algorithm and Particle Swarm Optimization are known as two most effective methods for HRESs. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Later, an algorithm combining both Genetic Algorithm and Discrete Cosine Transform was proposed, which shows the step-by-step sequence of both methods. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Optimizing LSTM S2S models with Evolutionary Mating Algorithm (EMA) for direct multi-step forecasting of household electrical power consumption by Al Mamun, Md Habib, Zuriani, Mustaffa, Junaida, Sulaiman, Mohd Herwan, Sulaiman

    Published 2026
    “…EMA successfully identifies optimal parameters, and EMA-optimized model achieved a significant improvement in accuracy over to baseline methods. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The proposed project will extract the features of system calls, network packets, CPU usage and battery usage of the application. The proposed project achieves overall accuracy level of 96.67% using Sequential Minimal Optimization classifier.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8

    Bayesian Framework based Brain Source Localization Using High SNR EEG Data by Jatoi, M.A., Kamel, N., Gaho, A.A., Dharejo, F.A.

    Published 2019
    “…These sources can be localized using different optimization algorithms. This localization information is usable for diagnoses of brain disorders such as epilepsy, Schizophrenia, depression and Alzheimer. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…The first scheme is a SensorAnt, which is a self-optimization mechanism for WSN. It is able to utilize and optimize the sensor nodes’ resources, especially the batteries, to achieve balanced energy consumption across all sensor nodes. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection by Alsmadi, Issa Mohammad Ibrahim

    Published 2018
    “…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17
  18. 18

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…Therefore, monitoring network wells should be optimized in information-cost-effective way, based on the current groundwater quality data and vulnerability of aquifer to contamination. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
    Get full text
    Get full text
    Thesis
  20. 20