Search Results - (( construct validity based algorithm ) OR ( java data optimization algorithm ))
Search alternatives:
- construct validity »
- data optimization »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
3
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
5
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018Get full text
Get full text
Thesis -
11
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
12
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
13
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012“…The performance of our algorithm is confirmed through simulations and validated against two leading CDS algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
15
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction
Published 2021“…This paper proposes an enhanced weight-optimized neural network based on Sine Cosine Algorithm (SCA) to accurately predict the wave height. …”
Get full text
Get full text
Article -
17
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…It consists of developing the appropriate research approach, methodology of negotiation and agent-based negotiation in VM. The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
Get full text
Get full text
Final Year Project
