Search Results - (( data (processing OR proceeding) problems algorithm ) OR ( java application modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…Having the ability to extract information from XML data would answer the problem of mining the web contents which is a very useful and required power nowadays. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Deploying blockchains to simplify AI algorithm auditing by Butt, Ayesha, Zahid Junejo, Aisha, Ghulamani, Sumbul, Mahdi, Ghulam, Shah, Asadullah, Khan, Dodo

    Published 2023
    “…In AI algorithms, bias occurs due to multiple reasons including incomplete data, skewed data, human error and so on. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Computational Discovery of Motifs Using Hierarchical Clustering Techniques by Wang, Dianhui, Lee, Nung Kion

    Published 2008
    “…Therefore, development of advanced algorithms for resolving this problem will be useful. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  5. 5

    Disparity between theory & practice beyond the worst-case competitive analysis by Iqbal, Javeria, Ahmad, Iftikhar, Shah, Asadullah

    Published 2019
    “…In an online problem, the algorithms is presented with a sequence on input in a serial fashion such that the algorithm does not have knowledge about the future inputs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Algorithmic approaches in model selection of the air passengers flows data by Ismail, Suzilah, Yusof, Norhayati, Tuan Muda, Tuan Zalizam

    Published 2015
    “…Algorithm is an important element in any problem solving situation.In statistical modelling strategy, the algorithm provides a step by step process in model building, model testing, choosing the ‘best’ model and even forecasting using the chosen model.Tacit knowledge has contributed to the existence of a huge variability in manual modelling process especially between expert and non-expert modellers.Many algorithms (automated model selection) have been developed to bridge the gap either through single or multiple equation modelling.This study aims to evaluate the forecasting performances of several selected algorithms on air passengers flow data based on Root Mean Square Error (RMSE) and Geometric Root Mean Square Error (GRMSE).The findings show that multiple models selection performed well in one and two step-ahead forecast but was outperformed by single model in three step-ahead forecasts.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri by Masri, Nor Khirda

    Published 2017
    “…This study aims to implement the classification algorithm using the Improved Clonal Selection Algorithm (ICLONALG) to classify the eyesight’s problems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Multi-Backpropagation network by Wan Ishak, Wan Hussain, Siraj, Fadzilah, Othman, Abu Talib

    Published 2002
    “…Backpropagation network with hidden layer able to process and model more complex problem. However, as some problem involve a large amount of data, the network would be more difficult to train. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Predicting Petroleum Reservoir Properties from Downhole Sensor Data using an Ensemble Model of Neural Networks by Fatai Adesina, Anifowose, Jane, Labadin, Abdulazeez, Abdulraheem

    Published 2013
    “…A lot of data is acquired during drilling and production processes through logging tools equipped with sub-surface/down-hole sensors. …”
    Get full text
    Get full text
    Proceeding
  10. 10
  11. 11

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…Problem of the size of data happen when data cannot be process because of it too complex. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection by Chia, Yee Shin

    Published 2015
    “…In addition, GA has the limitation on generalization which causes the problem of overfitting to the training data. Therefore a correlation-based filtering algorithm is embedded into GA feature selection to solve the over-fitting problem and increase the adaptability of the diagnostic scheme to unpredictable input data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…Evolutionary multi-objective algorithms are considered as good candidate for solving multi-objective optimization problems and have been applied to variety of problems in different areas. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…In this paper, a simple and effectiveness algorithm is proposed for fingerprint image recognition and the proposed algorithm is able to solve the problem discussed above. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  15. 15

    An improved chaotic image encryption algorithm by Al-Khasawneh, Mahmoud Ahmad, Shamsuddin, Siti Mariyam, M.Kamrul Hasan, Shafaatunnur, Ibrahim, Adamu Abubakar

    Published 2018
    “…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Hereditary traits based on lips analysis using Ellipse Fitting / Tantty Roshaida Rozaini by Rozaini, Tantty Roshaida

    Published 2010
    “…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An improved pheromone-based kohonen self-organising map in clustering and visualising balanced and imbalanced datasets by Azlin, Ahmad, Rubiyah, Yusof, Nor Saradatul Akmar, Zulkifli, Mohd Najib, Ismail

    Published 2021
    “…However, similar to other clustering algorithms, this algorithm requires sufficient data for its unsupervised learning process. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Optimization relates to the process of finding the optimum solution (either maximize or minimize) to a particular problem satisfying some given constraints. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Towards quick response and secure online banking transactions: using data compression and cryptography by Abdullah Zammarh, Nuha, Shah, Asadullah

    Published 2013
    “…This paper is going to review and address the current issues involving the online banking security by introducing the new quick and secure (QAS) process that has impact and accelerated the online banking transactions and set the bar high for a new frontier encryption algorithms.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper