Search Results - (( developing effective circular algorithm ) OR ( java classification using algorithm ))
Search alternatives:
- classification using »
- java classification »
- using algorithm »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
3
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Clustering algorithms can be used to create an outlier detection procedure in univariate circular data. …”
Get full text
Get full text
Get full text
Article -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
Get full text
Get full text
Thesis -
5
The Multiple Outliers Detection using Agglomerative Hierarchical Methods in Circular Regression Model
Published 2017“…Two agglomerative hierarchical clustering algorithms for identifying multiple outliers in circular regression model have been developed in this study. …”
Get full text
Get full text
Get full text
Article -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
7
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
8
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using minimum spanning tree method. …”
Get full text
Get full text
Get full text
Article -
9
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
10
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
Get full text
Get full text
Thesis -
13
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Development of robust control scheme for wheeled mobile robot in restricted environment
Published 2021“…To confirm the results of simulation for the proposed algorithm, a real-time experiments in circular path has been conducted to show that the proposed controller scheme is robust enough in the real -time control and able to track the robot effectively on its reference path. …”
Get full text
Get full text
Thesis -
15
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
16
Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code
Published 2010“…In this book, the performance measurements of algorithm are presented in terms of speedup, efficiency, effectiveness and temporal performance.…”
Get full text
Get full text
Get full text
Book -
17
Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code
Published 2010“…In this book, the performance measurements of algorithm are presented in terms of speedup, efficiency, effectiveness and temporal performance.…”
Get full text
Get full text
Get full text
Book Section -
18
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024Conference Paper -
19
HOLE ANALYSIS OF CARBON FIBER REINFORCED POLYMER (CFRP) LAMINATES STACK DRILLING IN AN AIRCRAFT APPLICATION
Published 2018“…Therefore, that is a need to develop cutting procedure to look at the effect of processing parameter on the product defect. …”
Get full text
Get full text
Final Year Project -
20
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The fuzzy inference model will be used to capture both fasting and non-fasting membership functions before feeding the results for classification to the neural network model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
