Search Results - (( developing formative usage algorithm ) OR ( java classification learning algorithm ))
Search alternatives:
- classification learning »
- developing formative »
- java classification »
- learning algorithm »
- formative usage »
- usage algorithm »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
3
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
4
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
5
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024Conference Paper -
6
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
8
Coverage performance analysis of genetic algorithm controlled smart antenna system
Published 2023“…GA then operates to optimize and steer the coverage beams to cater for dynamic users' distribution with minimum power usage. The experiment with GA embedded control system smart antenna shows good result in beam formation and steering to handle mobile users. �2010 IEEE.…”
Conference paper -
9
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
10
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Region-based Energy-aware Clustering (REC) for Efficient Packet Forwarding in WSN
Published 2010“…With REC, algorithms for energy efficient cluster formation, cluster head selection, and intercluster communication is proposed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
Get full text
Get full text
Get full text
Thesis -
13
Land Use Changes in Jeli, Kelantan
Published 2013“…The study reflected the progressive development in Jeli promotes sustainable usage of forest area when effort to retreat and restore forest was carried out forming a co-existence land use category between forest and agriculture.…”
Get full text
Undergraduate Final Project Report -
14
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
15
A Model of FPGA-based Direct Torque Controller
Published 2013“…This paper presents a generic model of a fully FPGA-based direct torque controller. This model is developed using two’s-complement fixed-point format approaches, in register-transfer-level (RTL) VHDL abstraction for minimizing calculation errors and consuming hardware resource usage. …”
Get full text
Get full text
Article -
16
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
17
A quality of experience approach in smartphone video selection framework for energy efficiency
Published 2021“…The VCS outcomes are essential to help users and developer deciding which suitable video streaming format that can satisfy energy consumption and user QoE.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Zero distortion-based steganography for handwritten signature
Published 2018“…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
19
Synthesis of YBa₂Cu₄O8 superconductor and analysis of electronic properties in comparison to other YBCO family compounds
Published 2020“…This study was to understand the Y124 phase formation and its formation rate. From the study, it could be summarized that; Y124 phase could form if the oxide precursors underwent the heat treatment environment in favour of Y124 and the secondary oxides would persist in sample, hence clean single phase Y124 was difficult to produce. …”
Get full text
Get full text
Thesis
