Search Results - (( vendor selection _ algorithm ) OR ( based optimization mead algorithm ))*

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network by Gumaida, Bassam, Abubakar, Adamu

    Published 2024
    “…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm by Ling, Kuok Fong, Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2023
    “…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Single and Multiple variables control using Tree Physiology Optimization by Halim, A.H., Ismail, I.

    Published 2017
    “…The proposed algorithm is also compared with deterministic gradient-free algorithm: Nelder-Mead simplex (NMS) and another metaheuristic algorithm: Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Article
  5. 5

    Evaluation of FCV and FCM clustering algorithms in cluster-based compound selection by Sinarwati, Mohamad Suhaili, Mohamad Nazim, Jambli

    Published 2011
    “…However, little research has been done on overlapping method fuzzy c-means (FCM) and fuzzy c-varieties (FCV) clustering algorithms in compound selection research. Therefore, these two clustering algorithms are implemented and the performance is analyzed based on the effectiveness of the clustering results in terms of mean intercluster molecular dissimilarity (MIMDS) where these results are compared with one another. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Network problems detection and classification by analyzing syslog data by Jarghon, Fidaa A. M.

    Published 2016
    “…Related syslog messages were identified; features were then selected to train the classifiers. Six classification algorithms were learned; LibSVM, SMO, KNN, Naïve Bayes, J48, and Random Forest. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Impacts of Butterworth post-filtering on absolute quantification of 99mTc SPECT/CT using nema phantom by Chi, Leah Tan Shin

    Published 2024
    “…Using phantom measurements, this multi-vendor and multi-center study evaluated the quantitative accuracy and inter-system variability of different SPECT/CT systems, as well as the impact of patient size, processing software and reconstruction algorithms on recovery coefficients (RC). …”
    Get full text
    Get full text
    Monograph
  11. 11

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Such distinguishing features make SDNs flexible, vendor agnostic, programmable, cost effective, and create an innovative network environment. …”
    Get full text
    Get full text
    Thesis