Search Results - (( developing robust selection algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Robust variable selection methods for large- scale data in the presence of multicollinearity, autocorrelated errors and outliers by Uraibi, Hassan S.

    Published 2016
    “…We develop Robust Forward Selection algorithm based on RFCH correlation coefficient (RFS.RFCH) because FS.Winso is not robust to multivariate outliers. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…In addressing this problem, some robust procedures for high dimensional dataset via the RFCH algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…The results on the model selection again signify that our proposed robust bootstrap model selection method is more robust than the classical bootstrap model selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS by Mohd Mustafa, Muhammad Izzatullah

    Published 2013
    “…Recently, the robust deconvolution algorithms that tolerate high levels of errors in pressure and rate than the previous deconvolution algorithms have been introduced in the literature. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Harmony search-based robust optimal controller with prior defined structure by Rafieishahemabadi, Ali

    Published 2013
    “…The second level compnses of two HS optimization algorithms developed and coded for robust stability examinations. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of robust procedures for partial least square regression with application to near infrared spectral data by Silalahi, Divo Dharma

    Published 2021
    “…To fill-in the gap in the literature, a new robust procedure in wavelength selection based on input scaling method is developed using Filter-Wrapper method. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Application of artificial immune system in designing power systems stabilizer by Ridhuan, Freddy Prasetia

    Published 2007
    “…Mimicking and imitating of biological immune system or better known as the artificial immune system is thus developed. Applying and implementing of the algorithm of the artificial immune system is to develop an immune controller. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE) by Tijani, Ismaila Bayo, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus

    Published 2015
    “…This thus requires a priori selection of weighting structures. Practical implications – The proposed MODE-infinity controller algorithm is expected to ease the design and deployment of the robust controller in autonomous helicopter application especially for practicing engineer with little experience in advance control parameters tuning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.] by Afolabi, Akindele Segun, Akinola, Olubunmi Adewale, Odetoye, Oyinlolu Ayomidotun, Adetiba, Emmanuel

    Published 2025
    “…Hence, it is crucial to determine ML models that are robust against such disruptions. In this paper, three algorithms were developed: the first was for outlier removal from features, the second was for feature selection, and the third was for partial-features-availability-aware ML model selection. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization by Kamal Z., Zamli, Abdul Kader, ., Fakhrud Din, ., Alhadawi, Hussam S.

    Published 2021
    “…This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). …”
    Get full text
    Get full text
    Get full text
    Article