Search Results - (( developing validation using algorithm ) OR ( java evaluation methods algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…However the lack of details of general NIRR simulation model is a clear limitation for the further improvement of the algorithm. The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…However the lack of details of general NIRR simulation model is a clear limitation for the further improvement of the algorithm. The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…An experimental analysis is conducted by several experiments to evaluate the performance of the proposed ensemble methods which has been tested on the 4 benchmark datasets, namely LingSpam, SpamAssassin, Spambase and CSDMC2010. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm by Ariff Nijay, Ramli

    Published 2023
    “…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. An automotive company is selected, and the collected actual data is used for validation purposes. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.] by Abdul Majid, M. M., Salleh, M. S., Abu Hashim, M. A., Ismail, N. H., Mansor, S., Abu Bakar, S. A.

    Published 2018
    “…The publication presents a controller strategy used in development of Semi Active Lateral Control (SALC) algorithm for passenger vehicle in enhancing transient handling performance using multibody co-simulation approach. …”
    Get full text
    Get full text
    Article
  14. 14

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…The results produced by the tools are then validated with other research finding. This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning by Solihin M.I., Yanto, Hayder G., Maarif H.A.-Q.

    Published 2024
    “…One of the prominent methods to improve machine learning accuracy is by using ensemble method which basically employs multiple base models. …”
    Conference Paper
  18. 18

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…In this study, 227 volumes of brain CT images were used to develop and validate the CAD. The new develop algorithm is set to register image of brain patient in order to determine the rotation angle for brain realignment. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project