Search Results - (( developing function mead algorithm ) OR ( java evaluation study algorithm ))

Refine Results
  1. 1

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Simulation of COVID-19 outbreaks via graphical user interface (GUI) by Mohd Jamil, Norazaliza, Rosli, Norhayati, Muhammad, Noryanti

    Published 2021
    “…An improved SIRD model was solved via the 4th order Runge-Kutta (RK4) method and 14 unknown parameters were estimated by using Nelder- Mead algorithm and pattern-search technique. The publicly available data for COVID-19 outbreak in Malaysia was used to validate the performance of the model. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia: a GUI-based seird predictive model using Streamlit by Norsyahidah Zulkarnain, Muhammad Salihi Abdul Hadi, Nurul Farahain Mohammad, Shogar, Ibrahim

    Published 2024
    “…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Modelling transmission dynamics of covid-19 during Pre-vaccination period in Malaysia: a predictive guiseird model using streamlit by Zulkarnain, Norsyahidah, Abdul Hadi, Muhammad Salihi, Mohammad, Nurul Farahain, Shogar, Ibrahim

    Published 2023
    “…The mathematical model is solved using Scipy odeint function, which uses Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. …”
    Get full text
    Get full text
    Article
  7. 7

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Modelling transmission dynamics of Covid-19 during pre-vaccination period in Malaysia : a gui-based seird predictive model using streamlit by Zulkarnain, Norsyahidah, Abdul Hadi, Muhammad Salihi, Mohammad, Nurul Farahain, Shogar, Ibrahim

    Published 2024
    “…The mathematical model is solved using the Scipy odeint function, which uses the Livermore Solver for Ordinary Differential Equations with an Automatic method switching (LSODA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…The study of Bat Algorithm is achieved the purpose of this research. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance by Siti Nurashiken, Md Sabudin

    Published 2023
    “…The numerical solution is obtained by adopting the Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance by Siti Nurashiken, Md Sabudin, Norazaliza, Mohd Jamil

    Published 2024
    “…The numerical solution is obtained by adopting the 4th-order Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning by Solihin M.I., Yanto, Hayder G., Maarif H.A.-Q.

    Published 2024
    “…The landslide data together with its conditioning factors (feature variables) collected from three districts in the Central Java Province, Indonesia, has been used as the case study for the LSM. …”
    Conference Paper
  18. 18

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The proposed system is then designed and developed using Java programming language. The performance of the proposed system is evaluated in a two-floor building using offthe- shelf WLAN access points and client device. …”
    Get full text
    Get full text
    Thesis
  19. 19

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis