Search Results - (( time optimization method algorithm ) OR ( data optimization modified algorithm ))

Refine Results
  1. 1

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Predicting longitudinal dispersion coefficient using ensemble models and optimized multi-layer perceptron models by Gholami M., Ghanbari-Adivi E., Ehteram M., Singh V.P., Najah Ahmed A., Mosavi A., El-Shafie A.

    Published 2024
    “…This study proposes ensemble models for predicting LDC based on multilayer perceptron (MULP) methods and optimization algorithms. The honey badger optimization algorithm (HBOA), salp swarm algorithm (SASA), firefly algorithm (FIFA), and particle swarm optimization algorithm (PASOA) are used to adjust the MULP parameters. …”
    Article
  3. 3

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…his thesis implements a novel nature-inspired metaheuristic optimization algorithm, namely the modified Multi-Verse Optimizer (mMVO) algorithm, to identify the continuous-time model of Hammerstein system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The new proposed method (MBPSO+MKN+GK) Gustafson- Kessel algorithm (GK)integrated with modified of Kohonen Network algorithm (MKN)and modified binary particle swarm optimization (MBPSO) was used to classify the credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Modified Harris Hawks Optimization Algorithm For Protein Multiple Sequence Alignment by Ibrahim, Al-Zaidi Mohammed Khaleel

    Published 2024
    “…However, finding similarities across large databases is an np-hard problem, meaning it is extremely difficult and time-consuming to solve exactly in real time. This highlights the need for faster and more accurate methods. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, Hishamuddin, Abd. Samad, M. F., Ahmad, Robiah, Yaacob, M. S.

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  8. 8

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Jamaluddin, H., Samad, M. F. A., Ahmad, R., Yaacob, M. S.

    Published 2007
    “…he genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Article
  9. 9

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Abd Samad, Md Fahmi

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    1D Multigrid Solver For Finite Element Method by Azhar, Mohamad Amiruddin

    Published 2022
    “…This available algorithm of the Multigrid solver with the Finite Element Method was modified and tested for its performance. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Parameter extraction of single, double, and three diodes photovoltaic model based on guaranteed convergence arithmetic optimization algorithm and modified third order Newton Raphso... by Mohammed Ridha, Hussein, Hizam, Hashim, Mirjalili, Seyedali, Othman, Mohammad Lutfi, Ya'acob, Mohammad Effendy, Ahmadipour, Masoud

    Published 2022
    “…The proposed guaranteed convergence arithmetic optimization algorithm based on efficient modified third order Newton Raphson (GCAOAEmNR) method highlights important contributions to the literature in terms of methodology (explorer-exploiter phases) and objective function design. …”
    Get full text
    Get full text
    Article
  12. 12

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…This strategy includes a number of components that are a novel approach to clustering generation. In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis