Search Results - (( vendor selection based algorithm ) OR ( based optimization isotherm algorithm ))*

Search alternatives:

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Evaluation of FCV and FCM clustering algorithms in cluster-based compound selection by Sinarwati, Mohamad Suhaili, Mohamad Nazim, Jambli

    Published 2011
    “…However, little research has been done on overlapping method fuzzy c-means (FCM) and fuzzy c-varieties (FCV) clustering algorithms in compound selection research. Therefore, these two clustering algorithms are implemented and the performance is analyzed based on the effectiveness of the clustering results in terms of mean intercluster molecular dissimilarity (MIMDS) where these results are compared with one another. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A gauss-newton approach for nonlinear optimal control problem with model-reality differences by Sie, Long Kek, Jiao, Li, Leong, Wah June, Abd Aziz, Mohd Ismail

    Published 2017
    “…Here, the linear model-based optimal control model is considered, so as the optimal control law is constructed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Production and characterization of biochar derived from oil palm wastes, and optimization for zinc adsorption by Zamani, Seyed Ali

    Published 2015
    “…The incremental back propagation algorithm demonstrated the best results and which has been used as learning algorithm for ANN in combination with Genetic Algorithm in the optimization. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Modeling of Cu(II) adsorption from an aqueous solution using an Artificial Neural Network (ANN) by Khan, T., Manan, T.S.B., Isa, M.H., Ghanim, A.A.J., Beddu, S., Jusoh, H., Iqbal, M.S., Ayele, G.T., Jami, M.S.

    Published 2020
    “…The Fletcher-Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
    Get full text
    Get full text
    Article
  11. 11

    Modelling and simulation of hollow profile aluminium extruded product by Sulaiman, Shamsuddin, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar, Magid, Hani Mizhir

    Published 2015
    “…This process is an isothermal process with an extrusion ratio of 3.3. Subsequently, the optimized algorithm for these extrusion parameters was suggested based on the simulation results. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Modeling of cu(ii) adsorption from an aqueous solution using an artificial neural network (ann) by Khan, Taimur, Abd Manan, Teh Sabariah, Hasnain Isa, Mohamed, A. J. Ghanim, Abdulnoor, Beddu, Salmia, Jusoh, Hisyam, Iqbal, Muhammad Shahid, Ayele, Gebiaw T, Jami, Mohammed Saedi

    Published 2020
    “…The Fletcher–Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14