Search Results - (( model mitigating ((bat algorithm) OR (_ algorithm)) ) OR ( user identification svm algorithm ))

Refine Results
  1. 1

    Development of interactive application for classification of Artocarpus Species by Abdul Ghapar, Nadia

    Published 2020
    “…The combination of Prewitt algorithm, Canny alogorithm, Gray-Level co-occurrence matrix will be used in SVM. …”
    Get full text
    Undergraduate Final Project Report
  2. 2
  3. 3

    Rapid lard identification with portable electronic nose by Latief, Marsad, Khorsidtalab, Aida, Saputra, Irwan, Akmeliawati, Rini, Nordin, Anis Nurashikin, Jaswir, Irwandi, Witjaksono, Gunawan

    Published 2017
    “…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6% among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Rapid lard identification with portable electronic nose by Latief, M., Khorsidtalab, A., Saputra, I., Akmeliawati, R., Nurashikin, A., Jaswir, I., Witjaksono, G.

    Published 2017
    “…A portable reliable device with an ability to identify lard rapidly can be convenient to users concerned about lard adulteration. The prototype was examined using K-Nearest Neighbors algorithm (KNN), Support Vector Machine (SVM), Bagged Trees and Simple Tree, and can identify lard with the highest accuracy of 95.6 among three types of fat (lard, chicken and beef) in liquid form over a certain range of temperature using KNN. © Published under licence by IOP Publishing Ltd.…”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    GA-based feature subset selection in a spam/non-spam detection system by Behjat, Amir Rajabi, Mustapha, Aida, Nezamabadi-pour, Hossein, Sulaiman, Md. Nasir, Mustapha, Norwati

    Published 2012
    “…Spam has created a significant security problem for computer users everywhere. Spammers take an advantage of defrauds to cover parts of messages that can be used for identification of spam. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Managing and controlling design process issues by using stepwise approach modelling by Abdelrafe, Elzamly, Burairah, Hussin, Norhaziah, Md Salleh, Abdul Samad, Shibghatullah

    Published 2016
    “…Furthermore, we illustrated the design process issues were mitigated by control techniques in Table 40. However, we need to combine more techniques and artificial optimal algorithms to mitigate the issues in software design process.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Quantitative and intelligent risk models in risk management for constructing software development projects: A review by Burairah, Hussin, Abdelrafe, Elzamly

    Published 2016
    “…Indeed, this area needs more effort from scholars and researchers in quantitative and intelligent risk models to mitigate risks. As future work, we will use these hybrid models of quantitative and intelligent for mitigating software risks in cloud computing such as neural network, genetic algorithm and others artificial intelligence techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity by Ghasemi, Sepehr, Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2016
    “…The proposed THF-NLFXLMS algorithm, models the nonlinear secondary path and applies the estimated degree of nonlinearity in the control algorithm design. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancing river health monitoring: Developing a reliable predictive model and mitigation plan by Azha S.F., Sidek L.M., Ahmad Z., Zhang J., Basri H., Zawawi M.H., Noh N.M., Ahmed A.N.

    Published 2024
    “…Thus, there is a pressing need to create a precise and robust water quality prediction model. The dynamic and non-linear characteristics of water quality parameters pose significant challenges for conventional machine learning algorithms like multi-linear regression, as they struggle to capture these complexities. …”
    Article
  12. 12

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A novel peak shaving algorithm for islanded microgrid using battery energy storage system by Uddin, Moslem, Romlie, M.F., Abdullah, M.F., Tan, Chia Kwang, Shafiullah, G.M., Bakar, Ab Halim Abu

    Published 2020
    “…Effectiveness of the proposed algorithm was tested with a BESS-based MATLAB/Simulink model of an actual microgrid under realistic load conditions which were recorded. …”
    Get full text
    Get full text
    Article
  14. 14

    A novel peak shaving algorithm for islanded microgrid using battery energy storage system by Uddin, M., Romlie, M.F., Abdullah, M.F., Tan, C., Shafiullah, G.M., Bakar, A.H.A.

    Published 2020
    “…Effectiveness of the proposed algorithm was tested with a BESS-based MATLAB/Simulink model of an actual microgrid under realistic load conditions which were recorded. …”
    Get full text
    Get full text
    Article
  15. 15

    Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system by Al-omari, Motea Saleh Mohammed

    Published 2017
    “…The first proposed hybrid approach consists of two combined schemes, termed as Resource Allocation based Fractional Frequency Reuse and Graph Connectivity algorithm (RAFFRGC). The second proposed interference mitigation technique is a full frequency reuse termed as Resource Allocation based Cuckoo Search Algorithm (RACSA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    GEOSPATIAL TEMPORAL FRAMEWORK ON LANDSLIDES MITIGATION STRATEGIES FOR PIPELINES by IBRAHIM, MUHAMMAD BELLO

    Published 2023
    “…AUC values of 0.879 were obtained for the susceptibility models developed from the SVM algorithms, indicating outstanding predictive performance.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Performance comparison of different machine learning algorithms on a time-series of covid-19 data: A case study for Saudi Arabia by Ahmad, M.T., Qaiyum, S., Alamri, A., Islam, S.

    Published 2021
    “…Several machine learning models and related algorithms were developed for prediction of total cases and total deaths. …”
    Get full text
    Get full text
    Article