Search Results - (( data classification bat algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    Naive bayes-guided bat algorithm for feature selection. by Taha, Ahmed Majid, Mustapha, Aida, Chen, Soong Der

    Published 2013
    “…Bio-inspired method called Bat Algorithm hybridized with a Naive Bayes classifier has been presented in this work. …”
    Get full text
    Get full text
    Article
  4. 4

    Naive Bayes-guided bat algorithm for feature selection by Taha A.M., Mustapha A., Chen S.-D.

    Published 2023
    “…Bio-inspired method called Bat Algorithm hybridized with a Naive Bayes classifier has been presented in this work. …”
    Article
  5. 5

    An improve unsupervised discretization using optimization algorithms for classification problems by Mohamed, Rozlini, Samsudin, Noor Azah

    Published 2024
    “…Recognizing the critical role of discretization in enhancing classification performance, the study integrates equal width binning (EWB) with two optimization algorithms: the bat algorithm (BA), referred to as EB, and the whale optimization algorithm (WOA), denoted as EW. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An improve unsupervised discretization using optimization algorithms for classification problems by Mohamed, Rozlini, Samsudin, Noor Azah

    Published 2024
    “…Recognizing the critical role of discretization in enhancing classification performance, the study integrates equal width binning (EWB) with two optimization algorithms: the bat algorithm (BA), referred to as EB, and the whale optimization algorithm (WOA), denoted as EW. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Major problems in classification task are large amount of training data, large number of features and different behavior of data streams that reduce accuracy and increase computational cost in classifier training phase. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Application of augmented bat algorithm with artificial neural network in forecasting river inflow of hydroelectric reservoir stations in Malaysia by Joe Wee Wei, Mr.

    Published 2023
    “…As for R2, it is at 0.983 for the training data set and R2 of 0.948 for the testing data set of the hybrid model, compared to 0.955 and 0.932 for traing and testing data set of ANN standalone. …”
    text::Thesis
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis