Search Results - (( web application bat algorithm ) OR ( loss implications _ algorithm ))*

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Rotor losses in fault-tolerant permanent magnet synchronous machines by Raminosoa, Tsarafidy, Gerada, Christopher, Othman, Md Nazri, De Lillo, Liliana

    Published 2011
    “…There are numerous published literatures on the design of FT machines as well as on control algorithms used to maintain drive operation with an incurred fault. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A hybrid deep learning-based unsupervised anomaly detection in high dimensional data by Muneer, A., Taib, S.M., Fati, S.M., Balogun, A.O., Aziz, I.A.

    Published 2022
    “…However, Adamax optimization algorithm showed the best results when employed to train the DANN model. …”
    Get full text
    Get full text
    Article
  4. 4

    Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions by Shamshad, H., Ullah, F., Ullah, A., Kebande, V.R., Ullah, S., Al-Dhaqm, A.

    Published 2023
    “…Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. …”
    Get full text
    Get full text
    Article
  5. 5

    Integrated analysis of copy number and loss of heterozygosity in primary breast carcinomas using high-density SNP array by Ching, H.C., Naidu, R., Seong, M.K., Har, Y.C., Taib, N.A.

    Published 2011
    “…In this study, we aimed to explicate the underlying chromosomal copy number (CN) alterations and loss of heterozygosity (LOH) implicated in a cohort of Malaysian hospital-based primary breast carcinoma samples using a single nucleotide polymorphism (SNP) array platform. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…In addition, we need to practice the best cyber hygiene behaviors in order to avoid cyber-attacks like phishing, data loss, and others. Therefore, we need a deeper understanding of how the various variables have an impact on cyber hygiene behaviour. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    The predictive machine learning model of a hydrated inverse vulcanized copolymer for effective mercury sequestration from wastewater by Ghumman, A.S.M., Shamsuddin, R., Abbasi, A., Ahmad, M., Yoshida, Y., Sami, A., Almohamadi, H.

    Published 2024
    “…A predictive machine learning model was also developed to predict the amount of mercury removed () using GPR, ANN, Decision Tree, and SVM algorithms. Hyperparameter and loss function optimization was also carried out to reduce the prediction error. …”
    Get full text
    Get full text
    Article
  11. 11

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…The emergence of robo-advisory services has transformed the landscape of investment by offering automated, algorithm-driven financial planning with minimal human intervention. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13
  14. 14

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A conceptual anonymity model to ensure privacy for sensitive network data by Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar

    Published 2021
    “…This model will also be cost effective and data loss will be controlled using two different ways.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item