Search Results - (( some applications using algorithm ) OR ( _ application using algorithm ))*

Refine Results
  1. 1
  2. 2

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…Experiments were conducted using k-means, k-medoids and EM-algorithm. The study implements each algorithm using RapidMiner Software and the results generated was validated for correctness in accordance to the concept of external criteria method. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Neural Network Training Using Hybrid Particle-move Artificial Bee Colony Algorithm for Pattern Classification by Nuaimi, Zakaria Noor Aldeen Mahmood Al, Abdullah, Rosni

    Published 2017
    “…Traditional neural networks algorithms such as Back Propagation (BP) were used for ANNT, but they have some drawbacks such as computational complexity and getting trapped in the local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A block-based multi-scale background extraction algorithm by Davarpanah, Seyed Hashem, Khalid, Fatimah, Golchin, Maryam

    Published 2010
    “…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Wind farm reactive power optimization by using imperialist competitive algorithm by Soheilirad, Mohammadsoroush, Hizam, Hashim, Farzan, Payam, Hojabri, Mojgan, Fallah, Seyedeh Narjes, Soheilirad, G.

    Published 2013
    “…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Neural network training using hybrid particle-move artificial bee colony algorithm for pattern classification by Al Nuaimi, Zakaria Noor Aldeen Mahmood, Abdullah, Rosni

    Published 2017
    “…By optimizing the training of the neural networks using optimal weight set, better results can be obtained by the neural networks.Traditional neural networks algorithms such as Back Propagation (BP) were used for ANNT, but they have some drawbacks such as computational complexity and getting trapped in the local minima.Therefore, evolutionary algorithms like the Swarm Intelligence (SI) algorithms have been employed in ANNT to overcome such issues.Artificial Bees Colony (ABC) optimization algorithm is one of the competitive algorithms in the SI algorithms group. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga by Dada Emmanuel, Gbenga

    Published 2016
    “…Secondly, we compared the performance of our new algorithm pdAPSO with APSO, and PSO using 7 benchmark functions. …”
    Get full text
    Get full text
    Thesis
  12. 12

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm by Soheilirad, M., Hizam, H., Farzan, P., Hojabri, Mojgan, Fallah, S. N., Soheilirad, G.

    Published 2013
    “…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    School teacher-subject allocation management system by Yap, Dennis Jian Yuan

    Published 2024
    “…The algorithm that will be used is Genetic Algorithm which has NP level of difficulty. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The proposed EBGWO algorithm can be used for FS in anomaly detection tasks that involve any dataset size from various application domains.…”
    Get full text
    Get full text
    Thesis
  20. 20

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis