Zobrazeno 1 - 10
of 151
pro vyhledávání: '"Ahamad Tajudin, Khader"'
Publikováno v:
IEEE Access, Vol 11, Pp 59866-59881 (2023)
According to the literature reviews, the Gray Wolf Optimization (GWO) algorithm has been applied to various optimization problems, including feature selection. It is important to consider two opposing ideas while using the metaheuristic technique, ex
Externí odkaz:
https://doaj.org/article/5c0ac890f1f4453dbdeafcb3364b7418
Publikováno v:
Mağallaẗ Al-kūfaẗ Al-handasiyyaẗ, Vol 13, Iss 2, Pp 28-42 (2022)
Text document clustering (TDC) represents a key task in text mining and unsupervised machine learning, which partitions a specific documents’ collection into varied K-groups according to certain similarity/dissimilarity criterion. The multi-verse o
Externí odkaz:
https://doaj.org/article/a3a6572956d24b66be74af65cc98f6e9
Autor:
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Ammar Kamal Abasi, Sharif Naser Makhadmeh
Publikováno v:
IEEE Access, Vol 8, Pp 10584-10605 (2020)
Background. The most common and successful technique for signal denoising with nonstationary signals, such as electroencephalogram (EEG) and electrocardiogram (ECG) is the wavelet transform (WT). The success of WT depends on the optimal configuration
Externí odkaz:
https://doaj.org/article/be9cf3be00d8468182499634534ee9d2
Autor:
Farkhana, Muchtar, Abdul Hanan, Abdullah, Suhaidi, Hassan, Ahamad Tajudin, Khader, Kamal Zuhairi, Zamli
Publikováno v:
In Journal of Network and Computer Applications 1 April 2019 131:109-132
Autor:
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Joao P. Papa, Osama Ahmad Alomari
Publikováno v:
IEEE Access, Vol 6, Pp 76007-76024 (2018)
In the modern life, the authentication technique for any system is considered as one of the most important and challenging tasks. Therefore, many researchers have developed traditional authentication systems to deal with our digital society. Recently
Externí odkaz:
https://doaj.org/article/5234895d73b74aa9b12f7686dd83a6b5
Autor:
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Xin-She Yang, Mazin Abed Mohammed, Karrar Hameed Abdulkareem, Seifedine Kadry, Imran Razzak
Publikováno v:
Neural Computing and Applications. 35:7943-7962
Publikováno v:
Journal of ICT (2018)
Cuckoo search algorithm is considered one of the promising metaheuristic algorithms applied to solve numerous problems in different fields. However, it undergoes the premature convergence problem for high dimensional problems because the algorithm co
Externí odkaz:
https://doaj.org/article/ecc7148528a5497485d6032a25d969e3
Autor:
Mohammed Azmi Al-Betar, Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Asaju La’aro Bolaji, Mohammed A. Awadallah
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 9, Iss 5 (2016)
For decades, image enhancement has been considered one of the most important aspects in computer science because of its influence on a number of fields including but not limited to medical, security, banking and financial sectors. In this paper, a ne
Externí odkaz:
https://doaj.org/article/2d7724a318b648fda5433f4505f51f01
Publikováno v:
Journal of ICT, Vol 15, Iss 1 (2016)
A pedestrian evacuation under fire-spreading conditions is simulated by using a two-dimensional cellular automaton model. The proposed model presents a non-static fire-spreading behavior to avoid considerable discrepancies between reality and simulat
Externí odkaz:
https://doaj.org/article/ad972f70319f4e6ab4913065a61bf017
Publikováno v:
Applied Intelligence. 51:1992-2017
To improve the optimization efficiency for different optimization problems and take advantage of the dynamic membrane computing framework, this paper proposes an improved bat algorithm, namely, Dynamic Membrane-driven Bat Algorithm (DMBA). The dynami