Search Results - (( developing human optimisation algorithm ) OR ( java data function algorithm ))
Search alternatives:
- optimisation algorithm »
- function algorithm »
- developing human »
- data function »
- java »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…However, there needs to be more research examining the role of interactive methods in multiobjective optimisation problems. To integrate machine learning and human interactions, this paper develops a new three-stage interactive algorithm in business analytics, called the interactive Nautilus-based algorithm, to address complex problems. …”
Get full text
Get full text
Article -
4
Bee colony optimisation of the travelling salesman problem in light rail systems
Published 2019“…The study reported in this paper aimed to identify the most efficient algorithm and develop a mathematical model based on artificial bee colony optimisation to solve this problem in light rail transit systems. …”
Get full text
Get full text
Article -
5
-
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
8
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…This research focuses on multi-location coursework timetabling problem for Master of Science in Human Resource Development (MSc HRD) at the Faculty of Cognitive Sciences and Human Development (FCSHD), Universiti Malaysia Sarawak (UNIMAS). …”
Get full text
Get full text
Get full text
Thesis -
9
Developing individualised therapy for colistin through application of pharmacokinetic model tailored for critically ill Malaysian patients utilizing the HPLC-FLD
Published 2025“…The high-performance liquid chromatography with fluorescence detection (HPLC-FLD) method was developed and validated to measure colistin in human serum. …”
Get full text
Get full text
Thesis -
10
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
11
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
13
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
14
Design and development of fanger model and fuzzy logic based controller for air conditioners
Published 2019“…With the developed algorithm and controller prototype, energy consumption is optimised or minimised for the best financial outcome without sacrifice of human comfort. …”
Get full text
Get full text
Get full text
Article -
15
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…The Linear-PSO algorithm was the first version of improvement. However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
Get full text
Get full text
Thesis -
16
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Global warming: predicting OPEC carbon dioxide emissions from petroleum consumption using neural network and hybrid cuckoo search algorithm
Published 2015“…To improve effectiveness of the ANN, the cuckoo search algorithm was hybridised with accelerated particle swarm optimisation for training the ANN to build a model for the prediction of OPEC CO2 emissions. …”
Get full text
Get full text
Get full text
Article -
18
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The data transformed into cognitive maps to supply the data warehouse. …”
Get full text
Get full text
Thesis -
19
-
20
