Search Results - (( work motivation based algorithm ) OR ( _ application based algorithm ))

Refine Results
  1. 1

    Analysing ratio-based controllers against motivational game theory in peer-to-peer renewable energy trading by Abdullah Azahari, Abdul Aziz, Mohamad Hanif, Noor Hazrin Hany, Mohamed, Martina Muhaizira

    Published 2024
    “…A comparative analysis is conducted against a second controller employing a Motivational Game Theory (MGT) algorithm that incorporates prioritization of energy distribution based on price adjustments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The motivation of this work originates from recent studies on sketch-based modeling that emphasize on the reliance of the designers on traditional methods for conveying their ideas. …”
    Get full text
    Get full text
    Thesis
  3. 3

    GMSD-based perceptually motivated non-local means filter for image denoising by Baqar, Mohtashim *, Lau, Sian Lun *

    Published 2019
    “…Further, the proposed methodology also helps in mitigating the patch jittering blur effect (PJBE) and over smoothing of denoised images as observed with conventional NLM algorithm. Experimental evaluations based on visual-quality assessment and least-square based metrics have shown that the proposed algorithm yields better denoised image estimates than the conventional NLM algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A Social Based Model For Genetic Algorithms. by AL-Madi, Nagham Azmi, Khader, Ahamad Tajudin

    Published 2007
    “…Therefore, recent researches have employed structured populations, in order to eliminate randomness, such as island models, cellular model, multinational evolutionary algorithms, etc. In this proposal, a social based GA is introduced; this model is trying to mimic the actual social behavior and the actual death and birth process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations by Hassan, Ali Abdul-hussian, Md Shah, Wahidah, Husien, Ali Mohamed, Talib, Mohammed Saad, Mohammed, Ali Abdul Jabbar, Othman, Mohd Fairuz Iskandar

    Published 2019
    “…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A genetic algorithm for two-dimensional bin packing with due dates by Bennell, Julia A., Lee, Lai Soon, Potts, Chris N.

    Published 2013
    “…Comprehensive computational results are presented, which show that the Unified Tabu Search still works well in minimizing the bins, but the genetic algorithm performs slightly better. …”
    Get full text
    Get full text
    Article
  7. 7

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…Moreover, the proposed approach outperforms the WSP and SWP algorithms, where network efficiency in saturated load gains an 8.39% improvement while the satisfaction of delay and jitter constraints for time critical applications are also achieved. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Embedded Machine Learning-Based Spoiled Leftover Food Detection Device for Multiclass Classification by Wan Azman,, Wan Nur Fadhlina Syamimi, Ku Azir, Ku Nurul Fazira, Mohd Khairuddin, Adam

    Published 2024
    “…This work proposes using machine learning algorithms and electronic nose technology to recognise and forecast the contamination in leftover cooked food. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Interpretation of machine learning model using medical record visual analytics by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2021
    “…The state of the art of medical application that being implemented are mostly based on common machine learning model. …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    A hybrid constraint-based programming approach to design a sports tournament scheduling by Soong, Chai Juan, Ramli, Razamin, Ibrahim, Haslinda

    Published 2011
    “…Subsequently,previous work related to the problem is discussed. Thus, we present an innovative hybrid of a constraint-based algorithm and a neighbourhood search, which is an exploration into alternative and improved methodology in the problem of sports tournament scheduling with special multiple constraints. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    3D character reconstruction from 2D orthogonal images by Kok, Yung Thow

    Published 2025
    “…The algorithm can generate primitive shape from at least two orthogonal view images. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    LASSO-type estimations for threshold autoregressive and heteroscedastic time series models. by Muhammad Jaffri Mohd Nasir

    Published 2020
    “…We develop an active-set based block coordinate descent algorithm (BCD) to optimize exactly the group LASSO. …”
    Get full text
    Get full text
    UMK Etheses
  14. 14

    Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e by Anuar, Ammar

    Published 2016
    “…This thesis proposes an adaptive traffic prioritization algorithm over ad hoc network using IEEE 802.11e standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee by Chong , Hue Yee

    Published 2023
    “…Hence, a wide range of studies has been focused on determining the optimal weight values of ANN models and the number of hidden neurons. In this research work, the motivation is to develop an autonomous learning model based on the hybridization of an adaptive ANN and a metaheuristic algorithm for optimizing ANN parameters so that the network could perform learning and adaptation in a more flexible way and handle condition classification tasks more accurately in industries, such as in power systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Interpretation of machine learning model using medical record visual analytics by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2022
    “…The state of the art of medical application that being implemented are mostly based on common machine learning model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Survey on language processing algorithm for sign language synthesizer by Maarif, Haris Al Qodri, Akmeliawati, Rini, Gunawan, Teddy Surya

    Published 2017
    “…In this paper, we provide a comprehensive review on the work in SL synthesizer development. SL synthesizer is a tool that synthesizes or constructs series of signs of a particular SL based on the speech input given to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…To address a specific cloud security challenges, an enhanced authentication method is developed during this research work. Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Combinatorial interaction testing of software product lines: a mapping study by Sahid, Mohd Zanes, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Baharom, Salmi

    Published 2016
    “…The most prominent CIT techniques in aiding SPL testing are those based on greedy algorithms followed by meta-heuristics algorithms. …”
    Get full text
    Get full text
    Article
  20. 20

    A univariate marginal approach for pairwise testing of software product lines by Sahid, Mohd Zanes, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Baharom, Salmi

    Published 2017
    “…Therefore, it is the motivation of this work to investigate the feasibility of an Estimation of Distribution Algorithm (EDA), specifically the Univariate Marginal Distribution Algorithm (UMDA), in generating minimal test configuration for pairwise testing of SPL. …”
    Get full text
    Get full text
    Get full text
    Article