Search Results - (( regional distribution ((new algorithm) OR (_ algorithm)) ) OR ( user evaluation a algorithm ))

Refine Results
  1. 1

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution by Nokhanji, Nooshin

    Published 2014
    “…Therefore, in this study, a new algorithm called Scheduled-Activity Energy Aware Distributed Clustering (SA-EADC) is proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A PSO inspired asynchronous cooperative distributed hyper-heuristic for course timetabling problems by Joe Henry Obit, Rayner Alfred, Mansour Hassani Abdalla

    Published 2017
    “…From the experimental results, it shows that the proposed Asynchronous Cooperative Distribute Low-level heuristics (ACDLLHs) algorithm is able to find new best solutions for all five medium problem instances and shared optimal solutions for all five small instances. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,) …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The proposed model has distributed and cooperative hierarchical architecture, where nodes communicate with their region gateway node to make decisions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…All water distribution networks suffer from leaks and the amount of leakage widely varies between countries and regions within a country. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches by Alkhafaji, Ali Fawzi Mohammed Ali

    Published 2024
    “…The AMTS approach segments and extracts the whole tumor, core tumor, and enhanced tumor regions from the brain MR images, integrating the Multi-Objective Grasshopper Optimization algorithm, Kapur Entropy, Cross-Entropy, and Localized active contour.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…Therefore, by considering tracking as an optimisation problem, the proposed SwATrack algorithm searches for the optimal distribution of motion model without making prior assumptions, or prior learning of the motion model. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Defect detection based on extreme edge of defective region histogram by Wakaf, Zouhir, Jalab, Hamid Abdullah

    Published 2018
    “…Furthermore, Otsu-revised methods, like the valley-emphasis method and the background histogram mode extents, which overcome the drawbacks of the Otsu method, require preprocessing steps and fail to use the general threshold for multimodal defects. This study proposes a new automatic thresholding algorithm based on the acquisition of the defective region histogram and the selection of its extreme edge as the threshold value to segment all defective objects in the foreground from the image background. …”
    Get full text
    Get full text
    Article
  19. 19

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis