Search Results - (( construct evaluation focus algorithm ) OR ( java data optimization algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  3. 3

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    EasyA: Easy and effective way to generate pairwise test data by Rabbi, Khandakar Fazley, Sabira, Khatun, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2013
    “…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Predicting customer churn in telecommunication service provider industry using Random Forest / Wan Muhammad Naqib Zafran Wan Roslan by Wan Roslan, Wan Muhammad Naqib Zafran

    Published 2023
    “…The specific objectives include studying the complexity of the Random Forest algorithm, constructing a model adjusted to accurately predict customer churn, and conducting thorough testing and evaluation of the model's accuracy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Scheduling tight deadlines for scientific workflows in the cloud by Bajaher, Awadh Salem Saleh

    Published 2018
    “…This article will evaluate the performance of the Proportional Deadline Constrained (PDC) algorithm using Cloudsim and compare it with the Deadline Constrained Critical Path (DCCP) scheduling algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani by Ab Ghani, Nur Laila

    Published 2015
    “…The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Supplier selection for contractors using Fuzzy TOPSIS Algorithm / Mohamed Shafiq Mohamed Yusof by Mohamed Yusof, Mohamed Shafiq

    Published 2020
    “…The construction industry in Malaysia is among the major economic sectors that contribute significantly towards the economic growth of the country (Khan, Liew, & Ghazali, 2014). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adapting robot kinematics for human-arm motion recognition by Chan, C.S., Liu, H., Brown, D.

    Published 2007
    “…Finally, classification of the human-arm motion is achieved by comparing the QNTs to the parameters learnt with particle filter based motion tracking algorithm. Experimental evaluation has demonstrated the effectiveness of the proposed method in human-arm motion classification, and our future work is focused on extending the proposed method to recognise complex human motion, e.g. walking and running.…”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…For future work, the algorithm will be extended to identify the semantic level strategies, diagnose the strategies used and provide constructive feedback.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Construction and optimization of financial risk management model based on financial data and text data influencing information system by Hui Huang, Thien Sang Lim

    Published 2024
    “…Textual data insights can great lyimpact risk assessment results, although most risk management systems focus on quantitative financial assessments. This research constructs and enhances information system financial risk management models employing financial and textual data, including MD&A narratives, to fill this gap. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…The second contribution is the extraction pattern construction. Each named entity candidate will be assigned with an extraction pattern constructed from a set of word and syntactical feature. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis