Search Results - (( based constructing maximization algorithm ) OR ( java application classification algorithm ))

Refine Results
  1. 1

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map by Alzaidi, Amer Awad, Ahmad, Musheer, Ahmed, Hussam S., Al Solami, Eesa

    Published 2018
    “…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations by Goheannee

    Published 2014
    “…In this research, the algorithms studied includes Genetic Algorithm, Particle Swarm Optimization Algorithm, Differential Evolution Algorithm, Harmony Search Algorithm, Teaching-LearningBased Optimization Algorithm and Black Hole Algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations by Hassan, Ali Abdul-hussian, Md Shah, Wahidah, Husien, Ali Mohamed, Talib, Mohammed Saad, Mohammed, Ali Abdul Jabbar, Othman, Mohd Fairuz Iskandar

    Published 2019
    “…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Dual vector control strategy for a three-stage hybrid cascaded multilevel inverter by Kadir, M.N.A., Mekhilef, Saad, Ping, H.W.

    Published 2010
    “…The inverter has been constructed and the control algorithm has been implemented. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…MCCTreeGenerator used CGTree to select subtree called Maximal Compact Connected Tree (MCCTree) as query result based on MCLCA notion. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Then, the proposed method is developed based on the architecture such that the mining model is constructed once, and it can be frequently mined by various minsup. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…In order to increase the system efficiency and maximize the power generation, constructed operation models were optimized. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Parameter estimation of the cure fraction based on BCH model using left-censored data with covariates. by I. Aljawadi, Bader Ahnad, Abu Bakar, Mohd Rizam, Ibrahim, Noor Akma, Midi, Habshah

    Published 2011
    “…The analysis is constructed by means of the exponential distribution in the case of left censoring and within the framework of the expectation maximization (EM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Solving an application of university course timetabling problem by using genetic algorithm by Norhana, Shaibatul Khadri

    Published 2022
    “…Among the approaches, genetic algorithm (GA), constructed based on Darwin's theory of evolution, becomes the renowned approach to solve various types of timetabling problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…Then, the enhancement clustering algorithm will be constructed based on correlated degree which is selected as a cluster head to serves as a link connectivity between individual node and its neighbor to form network clustering. …”
    thesis::doctoral thesis