Search Results - (( development case replication algorithm ) OR ( java automatic classification algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm by Kasim Hawari, Mohd Zarifitri

    Published 2023
    “…Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Towards a self-adaptive agent-based simulation model by Loo Y.L., Tang A.Y.C., Ahmad A., Mustapha A.

    Published 2023
    “…The capability to self-adapt will allow the model to be easily extended and replicated. The self-adapt capability is enabled by a governing algorithm within the model and is conceptually illustrated through a case study of crime report process ABS modelling. � 2005 - 2016 JATIT & LLS. …”
    Article
  6. 6

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of low-overhead soft error mitigation technique for safety critical neural networks applications by Khalid Adam, Ismail Hammad

    Published 2021
    “…Importantly, S-MTTMR decreased the percentage of errors that case misclassification (Malfunction) from 3.70% to 0.38% and 5.23% to 0.23%, for AlexNet and DenseNet, respectively. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A genome wide study of copy number variation associated with nasopharyngeal carcinoma in Malaysian Chinese identifies CNVs at 11q14.3 and 6p21.3 as candidate loci by Low, Joyce Siew Yong, Chin, Yoon Ming, Mushiroda, Taisei, Kubo, Michiaki, Govindasamy, Gopala Krishnan, Pua, Kin Choo, Yap, Yoke Yeow, Yap, Lee Fah, Subramaniam, Selva Kumar, Ong, Cheng Ai, Tan, Tee Yong, Khoo, Alan Soo Beng, The Malaysian NPC Study Group, Ng, Ching Ching

    Published 2016
    “…PennCNV and cnvPartition calling algorithms were applied for CNV calling. Taqman CNV assays and digital PCR were used to validate CNV calls and replicate candidate copy number variant region (CNVR) associations in a follow-up Malaysian Chinese (NPC cases, n = 465; and Healthy controls, n = 677) and Malay cohort (NPC cases, n = 114; Healthy controls, n = 124). …”
    Get full text
    Get full text
    Article
  11. 11

    Determination of transfer capability considering risk and reliability cost/ worth assessment in dynamic and static system cascading collapses / Nur Ashida Salim by Salim, Nur Ashida

    Published 2015
    “…The proposed research methodology involved developing an algorithm commenced with a fault occurrence and then followed by the propagation of power system component tripping events which is defined as the system cascading collapse. …”
    Get full text
    Get full text
    Thesis