Search Results - (( content validation using algorithm ) OR ( java data optimization algorithm ))
Search alternatives:
- content validation »
- data optimization »
- validation using »
- using algorithm »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
3
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
5
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
-
9
Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani
Published 2025“…The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
Get full text
Get full text
Thesis -
10
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
11
Surface Moisture Content Retrieval from Visible/Thermal Infrared Images and Field Measurements
Published 2013“…Moisture content parameters were calculated, and then the moisture content algorithm was generated accordingly for the two study locations with three different “Split-window” algorithms and finally a spatial validation of satellite θ algorithms was conducted for accuracy assessment. …”
Get full text
Get full text
Article -
12
Application of artificial neural network to simulate phenolic content and antioxidant activity during spontaneous fermentation of Carica papaya leaf / Nur Syahira Mohammad and Moha...
Published 2020“…Data used to derive and validate the model was obtained from the experiment. …”
Get full text
Get full text
Conference or Workshop Item -
13
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
Get full text
Get full text
Thesis -
14
Development and validation of an unsaturated soil water flow model for oil palm
Published 2018“…The development and use of a soil water model to predict the soil water flow and content under oil palm would be useful as a tool for more effective oil palm water management. …”
Get full text
Get full text
Get full text
Article -
15
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, as well as for clinicians to use this system for training as well as for academic exercises. …”
Get full text
Get full text
Article -
16
-
17
Characterization of oil palm fruitlets using artificial neural network
Published 2014“…To further validate the generalization accuracy of the LSB_ANN, its performance was compared with that of a Multi-ANFIS network as well as those of three different ANN training algorithms: Levenberg Marquardt (LM) algorithm, Resilient Backpropagation (RP) algorithm and Gradient Descent with Adaptive learning rate (GDA). …”
Get full text
Get full text
Thesis -
18
Artificial neural network (ANN) modeling & validation to predict compression index of tropical soft soil
Published 2010“…Therefore, a programming was written by using MATLAB 6.5 and train with eight different training algorithm, namely Resilient Backpropagation (rp), Conjugate Gradient Polak-Ribiére algorithm (cgp), Scale Conjugate Gradient (scg), Levenberg-Marquardt algorithm (lm), BFGS Quasi-Newton (bfg), Conjugate Gradient with Powell/Beale Restarts (cgb), Fletcher-Powell Conjugate Gradient (cgf), and One-step Secant (oss) have been compared for the best prediction of Cc. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
20
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Then, the mapping percentages between the predefined and produced clusters are used to assess the performance of the proposed algorithm. …”
Get full text
Get full text
Article
