Search Results - (( construct solution machine algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- construct solution »
- data normalization »
- machine algorithm »
- java »
-
1
Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems
Published 2010“…A Genetic Algorithm is successful in generating near -optimal solutions if it is able to produce o®spring during crossover that is better than the parent solutions. …”
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules
Published 2013“…The algorithm fixes the class before rule's construction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
6
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…In response to worsening urban traffic congestion, metro tunnels have emerged as a solution to ease pressure on road networks. Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. …”
Get full text
Get full text
Get full text
Thesis -
7
Feedforward neural network for solving particular fractional differential equations
Published 2024“…Then, a single hidden layer of FNN based on Chelyshkov polynomials with an extreme learning machine algorithm (SHLFNNCP-ELM) is constructed for solving FDEsC. …”
Get full text
Get full text
Get full text
Thesis -
8
Methodology to develop heuristic for re-entrant flow shop with two potential dominant machines using bottleneck approach
Published 2012“…This paper presents a bottleneck-based methodology to solve scheduling problem of M1,M2,M3,M4,M3,M4 re-entrant flow shop where M1 and M4 have high tendency of being the dominant machines. Two generalised makespan algorithms using bottleneck approach were developed for the identified bottleneck. …”
Get full text
Get full text
Article -
9
-
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
11
Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai
Published 2021Get full text
Get full text
Thesis -
12
Fast Finite Difference Time Domain Algorithms for Solving Antenna Application Problem
Published 2008“…Only 1 3 and 1 9 parts of the solution domain are solved in the main looping construct for problem in 1D and 2D, while the remaining points are solved outside the loop. …”
Get full text
Get full text
Thesis -
13
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The solution that has been suggested is one that is both secure and effective when it is put to use in conjunction with the ECG and Covid-19 image encoding algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Enhancement of feature sets for subjectivity analysis on Malay-English code-switching text
Published 2023“…The combination has consistently performed at the accuracy of 59% using both machine learning classifiers. The consistent performance indicates the combined feature sets are the viable solution for subjectivity analysis on the Malay-English code-switching text.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Information extraction using Link Grammar
Published 2009“…LG appears within limited literature search to be the most suitable candidate algorithm. However, an exhaustive literature search will reveal the algorithm best suited to this application work. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan
Published 2013“…Sentiment Analysis for Malay Newspaper (SAMNews) is constructed using the negative selection algorithm which is able to classify the sentiment in newspaper’s sentences into the polarity (positive, negative or neutral) automatically repose on detectors word. …”
Get full text
Get full text
Thesis -
18
Using Machine Learning Algorithms to Estimate the Compressive Property of High Strength Fiber Reinforced Concrete
Published 2022“…Steel fibersâ�� addition in HSC results in bridging behavior which improves its post-cracking behavior, provides cracks arresting and stresses transfer in concrete. Using machine learning (ML) techniques, concrete properties prediction is an effective solution to conserve construction time and cost. …”
Get full text
Get full text
Article -
19
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…This study constructs the flow of DNN based method with the K-Means algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…From the analysis, the multiobjective CSSA (MOCSSA) had yielded better optimal solutions with faster convergence time as compared to the other two algorithms with improvement of voltage profile and losses minimisation. …”
Get full text
Get full text
Thesis
