Search Results - (( variable detection based algorithm ) OR ( initial solution methods algorithm ))

Refine Results
  1. 1

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In addition, experiments prove that incremental genetic-based clustering ensemble algorithm speed up to converge into an optimal clustering solution, where pattern ensemble learning method and the cluster partitions produced by the threshold fuzzy c-means clustering algorithm are employed as recombination operator and initial population, respectively.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Multistage optimal homotopy asymptotic method for solving initial-value problems by Anakira, N. R., Alomari, A. K., Jameela, Ali, Hashim, Ishak

    Published 2016
    “…In this paper, a new approximate analytical algorithm namely multistage optimal homotopy asymptotic method (MOHAM) is presented for the first time to obtain approximate analytical solutions for linear, nonlinear and system of initial value problems (IVPs).This algorithm depends on the standard optimal homotopy asymptotic method (OHAM), in which it is treated as an algorithm in a sequence of subinterval. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Combining approximation algorithm with genetic algorithm at the initial population for NP-complete problem by Razip, H., Zakaria, M.N.

    Published 2018
    “…In Genetic Algorithm (GA), the prevalent approach to population initialization are heuristics and randomization. …”
    Get full text
    Get full text
    Article
  4. 4

    Initialization Methods For Conventional Fuzzy C-Means And Its Application Towards Colour Image Segmentation by Tan , Khang Siang

    Published 2011
    “…Due to its capability in providing a particularly promising solution to clustering problems, the conventional Fuzzy C-Mean (FCM) algorithm is widely used as a segmentation method. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Comparison between Newton’s Method and a new Scaling Newton Method / Ramizah Baharuddin by Baharuddin, Ramizah

    Published 2021
    “…Newton's Method also called the Newton-Raphson method is a recursive algorithm for approximating the root of a differentiable function. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Shooting method with root finding to solve boundary value problems / Aryani Rima Matakim by Matakim, Aryani Rima

    Published 2025
    “…This method involves guessing initial conditions and iteratively adjusting them until the solution satisfies the boundary conditions at the other end of the domain. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing the RC4 algorithm by eliminating the Initiative Vector (IV) transmission by Waleed Abdelrahman Yousif Mohammed, Salmah Fattah, Khalid Mohammed Osman Saeed, Ashraf Osman Ibrahim Elsayed, Safaa Eltahier

    Published 2025
    “…This paper introduces an innovative approach to address the vulnerabilities of the RC4 encryption algorithm by employing an Initiative Vector (IV). The proposed method incorporates a lengthy random text without transmitting an initialization vector. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  14. 14

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  18. 18
  19. 19

    Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem by Wong, Jerng Foong

    Published 2022
    “…The Greedy heuristics by ratio was employed to construct an initial solution. Next, the solution was enhanced by using the hybrid TS-SBA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2010
    “…The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
    Get full text
    Get full text
    Conference or Workshop Item