Search Results - (( developing call tree algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- java optimization »
- method algorithm »
- developing call »
- tree algorithm »
- call tree »
-
1
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
5
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…This study proposed an enhanced algorithm called hellingerant-tree-miner (HATM) which is inspired by ant colony optimization (ACO) metaheuristic for imbalanced learning using decision tree classification algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
7
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…This tree is converted into another full tree in some rounds. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Prime-based method for interactive mining of frequent patterns
Published 2010“…In the mining model construction, the content of relevant data is captured by a novel tree structure called PC-tree with one database scan and mining materials are consequently formed. …”
Get full text
Get full text
Thesis -
10
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
12
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…MCCTreeGenerator used CGTree to select subtree called Maximal Compact Connected Tree (MCCTree) as query result based on MCLCA notion. …”
Get full text
Get full text
Thesis -
13
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
15
Improved tree routing protocol in zigbee networks
Published 2010“…The objective of this thesis was to develop the TR protocol for ZigBee network and is called Improved Tree Routing (ImpTR) protocol which is computationally simple in finding the shortest path to transmit data packets to the sink node, and does not need any addition in hardware. …”
Get full text
Get full text
Thesis -
16
Three dimension reconstruction of coronary artery tree using single-view cineangiogram
Published 2010“…Finally, we input the x, y and z of a specific coronary artery tree to the OPENGL library included in the software, which we developed and called Fast 3D (F3D) and which is displayed in R3. …”
Get full text
Get full text
Get full text
Article -
17
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
18
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
Get full text
Conference or Workshop Item -
19
Waste management using machine learning and deep learning algorithms
Published 2020“…For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…One of the trees is a binary tree data structure and the other is a B-tree data structure. …”
Get full text
Get full text
Thesis
