Search Results - (( parameter optimization model algorithm ) OR ( features solution using algorithm ))

Refine Results
  1. 1
  2. 2

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…Firefly algorithm outperformed the other metaheuristic algorithms used to solve this proposed hybrid artificial intelligence model regarding parameter sensitivity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…his thesis implements a novel nature-inspired metaheuristic optimization algorithm, namely the modified Multi-Verse Optimizer (mMVO) algorithm, to identify the continuous-time model of Hammerstein system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An application of backtracking search algorithm in designing power system stabilizers for large multi-machine system by Islam N.N., Hannan M.A., Shareef H., Mohamed A.

    Published 2023
    “…Damping; Eigenvalues and eigenfunctions; Electric power systems; Learning algorithms; Optimization; Particle swarm optimization (PSO); Problem solving; State space methods; Test facilities; Backtracking search algorithms; Multi machine power system; Power system damping; Power system oscillations; Power system stability; Power System Stabilizer; System stability; algorithm; Article; backtracking search algorithm; bacterial foraging optimization algorithm; machine; mathematical analysis; mathematical computing; mathematical parameters; particle swarm optimization; power supply; power system stabilizer; process optimization; statistical model…”
    Article
  6. 6

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Unlike the existing optimization algorithm, VL-WIDE features the capability of searching different lengths of solutions to cover the variable number of cloudlets for deployment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Physics-guided deep neural network to characterize non-Newtonian fluid flow for optimal use of energy resources by Kumar, A., Ridha, S., Narahari, M., Ilyas, S.U.

    Published 2021
    “…The detailed parametric analysis exhibits the competency of the proposed algorithm to explain the rheological features. Monte-Carlo simulation is performed by propagating uncertainty to investigate the dominant parameters affecting simulated results. …”
    Get full text
    Get full text
    Article
  8. 8

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Therefore, MTS is developed from TS with some additional features such as systematic neighbourhood evaluation procedure to reach the near optimal solutions quickly. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Data Analysis and Machine Learning Algorithms Evaluation for Bioliq AI-based Predictive Tool by Samuel Simbine, Augusto

    Published 2019
    “…This final year project identified relevant parameters through literature research, analysis and expert interview, and evaluated different machine learning algorithms and identified linear regression as the most applicable and efficient with its R-square of 0.8015, qualifying it to be used for the development of a hybrid model for the AI-based tool for predictive process optimization for chemical plants.…”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The new proposed method (MBPSO+MKN+GK) Gustafson- Kessel algorithm (GK)integrated with modified of Kohonen Network algorithm (MKN)and modified binary particle swarm optimization (MBPSO) was used to classify the credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Optimizing LSTM S2S models with Evolutionary Mating Algorithm (EMA) for direct multi-step forecasting of household electrical power consumption by Al Mamun, Md Habib, Zuriani, Mustaffa, Junaida, Sulaiman, Mohd Herwan, Sulaiman

    Published 2026
    “…This study proposes a hybrid approach that combines a Long Short-Term Memory Sequence to Sequence (LSTM S2S) model with the Evolutionary Mating Algorithm (EMA) to optimize the model settings. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Predicting open space parking vacancies using machine learning by Lee, Wei Jun

    Published 2023
    “…A custom object detector developed using the YOLOv4 algorithm was used to collect the data for training the machine learning model. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14
  15. 15

    An Optimized Load Shedding Approach in Power Grids to Mitigate Cascading Failure by Ahmed M. A., Haidar, Andreas, Helwig, Liviu, Moldovan

    Published 2025
    “…The particle swarm optimization algorithm is employed in cloud computing and monitoring environments to minimize the amount of power to be shed and its location. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  16. 16

    Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2018
    “…Based on visual sensor parameters information, and the features of the area to be monitored, this paper uses a deterministic modeling approach to model the sensor coverage in a 2-D space. …”
    Get full text
    Get full text
    Article
  17. 17

    Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2018
    “…Based on visual sensor parameters information, and the features of the area to be monitored, this paper uses a deterministic modeling approach to model the sensor coverage in a 2-D space. …”
    Get full text
    Get full text
    Article
  18. 18

    Multi-parametric optimization of aerodynamic performance and pedestrian crash in sedan front-end profiles by Nor Azman, Afzatul Najwa

    Published 2025
    “…A multiobjective optimization framework was developed using computational simulations, mathematical modelling, and evolutionary algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH by NUR AFIQAH, JAHILAN

    Published 2022
    “…Precisely, the fuzzy TOPSIS algorithm has selected the best configuration of PV system with financial optimization feature. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The implementation of the four features is described as follows: Firstly, the SCBEH model, which optimized a MONA benchmark model and absorbed all its security technologies, has four aspects to be considered: 1) the use of symmetric and asymmetric hybrid encryption technique (KEM-DEM), in which the latest elliptic curve cryptography algorithm (ECC) of asymmetric encryption is used; 2) the applications of group key distribution and group signature technologies are achieved; 3) the revocation and tracking of illegal group members are reimplemented; 4) the computational burden of client is alleviated. …”
    Get full text
    Get full text
    Get full text
    Thesis