Zobrazeno 1 - 10
of 161
pro vyhledávání: '"Ahamad Tajudin Khader"'
Publikováno v:
IEEE Access, Vol 11, Pp 59866-59881 (2023)
According to the literature reviews, the Gray Wolf Optimization (GWO) algorithm has been applied to various optimization problems, including feature selection. It is important to consider two opposing ideas while using the metaheuristic technique, ex
Externí odkaz:
https://doaj.org/article/5c0ac890f1f4453dbdeafcb3364b7418
Publikováno v:
Mağallaẗ Al-kūfaẗ Al-handasiyyaẗ, Vol 13, Iss 2, Pp 28-42 (2022)
Text document clustering (TDC) represents a key task in text mining and unsupervised machine learning, which partitions a specific documents’ collection into varied K-groups according to certain similarity/dissimilarity criterion. The multi-verse o
Externí odkaz:
https://doaj.org/article/a3a6572956d24b66be74af65cc98f6e9
Autor:
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Ammar Kamal Abasi, Sharif Naser Makhadmeh
Publikováno v:
IEEE Access, Vol 8, Pp 10584-10605 (2020)
Background. The most common and successful technique for signal denoising with nonstationary signals, such as electroencephalogram (EEG) and electrocardiogram (ECG) is the wavelet transform (WT). The success of WT depends on the optimal configuration
Externí odkaz:
https://doaj.org/article/be9cf3be00d8468182499634534ee9d2
Autor:
Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Joao P. Papa, Osama Ahmad Alomari
Publikováno v:
IEEE Access, Vol 6, Pp 76007-76024 (2018)
In the modern life, the authentication technique for any system is considered as one of the most important and challenging tasks. Therefore, many researchers have developed traditional authentication systems to deal with our digital society. Recently
Externí odkaz:
https://doaj.org/article/5234895d73b74aa9b12f7686dd83a6b5
Publikováno v:
Journal of ICT (2018)
Cuckoo search algorithm is considered one of the promising metaheuristic algorithms applied to solve numerous problems in different fields. However, it undergoes the premature convergence problem for high dimensional problems because the algorithm co
Externí odkaz:
https://doaj.org/article/ecc7148528a5497485d6032a25d969e3
Autor:
Mohammed Azmi Al-Betar, Zaid Abdi Alkareem Alyasseri, Ahamad Tajudin Khader, Asaju La’aro Bolaji, Mohammed A. Awadallah
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 9, Iss 5 (2016)
For decades, image enhancement has been considered one of the most important aspects in computer science because of its influence on a number of fields including but not limited to medical, security, banking and financial sectors. In this paper, a ne
Externí odkaz:
https://doaj.org/article/2d7724a318b648fda5433f4505f51f01
Publikováno v:
Journal of ICT, Vol 15, Iss 1 (2016)
A pedestrian evacuation under fire-spreading conditions is simulated by using a two-dimensional cellular automaton model. The proposed model presents a non-static fire-spreading behavior to avoid considerable discrepancies between reality and simulat
Externí odkaz:
https://doaj.org/article/ad972f70319f4e6ab4913065a61bf017
Publikováno v:
Statistika, Vol 4, Iss 2 (2014)
When comparing and evaluating two or more scheduling methods the need to use a multiple criteria decisionmaking technique arises. Instead of just employing a qualitative approach of evaluating the methods, one can integrate the qualitative and the qu
Externí odkaz:
https://doaj.org/article/7e463467ef8046a98cc38abf9e2fadad
Autor:
Mohammed Azmi Al-Betar, Ahamad Tajudin Khader, Mohammed A. Awadallah, Mahmmoud Hafsaldin Alawan, Belal Zaqaibeh
Publikováno v:
Journal of Applied Mathematics, Vol 2013 (2013)
Structured population in evolutionary algorithms (EAs) is an important research track where an individual only interacts with its neighboring individuals in the breeding step. The main rationale behind this is to provide a high level of diversity to
Externí odkaz:
https://doaj.org/article/6618a52ed2fa41d6adac45731195dbd2
Autor:
Farkhana, Muchtar, Abdul Hanan, Abdullah, Suhaidi, Hassan, Ahamad Tajudin, Khader, Kamal Zuhairi, Zamli
Publikováno v:
In Journal of Network and Computer Applications 1 April 2019 131:109-132