Search Results - (( data replication testing algorithm ) OR ( parallel optimisation based algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…The optimisation of tool path length based on ACO algorithm ascertained that the cutting tool remove the uncut line once and able to eliminate the uncut region in the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The aim of this research is to handle the deadlock problem in NRG to preserve the consistency of data and increase the throughput. The NRGDD simulation model has been developed to test the algorithm on NRG. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…The results of this research are important in developing a routing algorithm for CHR6o3.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman by Hamdan, Muhammad Halim, Abdul-Rahman, Shuzlina

    Published 2021
    “…Each technique was replicated, trained and tested accordingly. M4 competition dataset was used in this research, with 100,000 time series data and multiple data frequency, which is enough to replicate the real-world situation. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Simulated Annealing-Based Hyper-Heuristic For The Flexible Job Shop Scheduling Problem by Kelvin, Lim Ching Wei

    Published 2023
    “…Flexible job shop scheduling problem (FJSP) is a common optimisation problem in the industry. The use of parallel machines allows an operation to be executed on a machine assigned from a set of alternative machines, raising a combination of machine assignment and job sequencing sub-problems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Finite element modeling and updating for dynamic study of exhaust structure by M. S. M., Fouzi, M. S. M., Sani

    Published 2020
    “…Hence, this paper is carried out to reduce the discrepancies between numerical prediction results with measured test data on FE model of exhaust structure by implementing FE model updating using SOL200 algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…Additionally, the Wilcoxon rank test was used to perform the significance analysis between the proposed SCSOKNN method and six other algorithms for a p-value less than 5.00E-02. …”
    Get full text
    Get full text
    Article
  14. 14

    Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm by W., Safiei, Rahman, M. M., M.Y., Ali

    Published 2024
    “…The optimum parameters were determined according to the design flow, constraints value and mathematical algorithm. Based on MOGA-II analysis, every workflow generated 1600 feasible solutions for optimization that meet the design space requirement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Case studies for simulating dynamic processes of new student registration (administrative domain), transport request (transportation domain) and crime investigation (security domain) with real data collected through interview and document reviews to test the proposed idea. …”
    text::Thesis
  18. 18

    Finger-Vein Biometric Identification Using Convolutional Neural Network by Syafeeza, Ahmad Radzi, Mohamed, Khalil-Hani, Rabia, Bakhteri

    Published 2016
    “…An identification rate of 100.00% is achieved, with an 80/20 percent ratio for separation of training and test samples, respectively. An additional number of subjects have also been tested, in which for 81 subjects an accuracy of 99.38% is achieved.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
    Get full text
    Get full text
    Thesis
  20. 20