Search Results - (( development concept selection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- development concept »
- selection algorithm »
- data normalization »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…Overall, the developed algorithms have similar PSNR value and lower average search point compared to superior algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…The basic concept of the GA is the natural selection and survival of the fittest, which is identical to the human genetic. …”
Get full text
Get full text
Thesis -
6
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Being that feature subset selection is considered a multi-objective optimization problem, this study proposed the Rao-SVM as an FSS mechanism; its algorithm-specific and parameter-less concept was also explored. …”
Get full text
Get full text
Get full text
Article -
7
Genetic algorithm based ensemble framework for sentiment analysis
Published 2018“…Prior to developing the whole multilayered ensemble framework, two separate experiments were performed to evaluate and study the different methods of feature extraction and selection. …”
Get full text
Get full text
Thesis -
8
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
10
Transport route optimization using genetic algorithm
Published 2004“…Genetic Algorithm, a branch in artificial intelligence, applies the concept of selection, crossover and mutation in genetic discipline, is used as the backend engine in this program to optimize a given route.…”
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Suitability Factor on the Capacitated Vehicle Routing Problem
Published 2010“…A new variant of algorithm called Dynamic Ant Colony System with Three Level Updates (DACS3) has been developed which focuses on adding individual ant behavior. …”
Get full text
Get full text
Conference or Workshop Item -
12
A proposed model for the selection of workers on crowdsourcing platforms utilizing nested criteria matching
Published 2024“…The objective of this study is to examine the concept of crowdsourcing and the corresponding method for employee selection. …”
Get full text
Get full text
Get full text
Article -
13
Estimated and analysis of the relationship between the endogenous and exogenous variables using fuzzy semi-paranetric sample selection model
Published 2014“…Besides that, proofs of the theorems are presented. An algorithm using the concept of fuzzy modelling is developed. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering
Published 2022“…According to the literature, crowding distance as one of the most efficient algorithms was developed based on density measures to treat the problem of selection mechanism for archive update. …”
Get full text
Get full text
Thesis -
15
Multi-objective clustering algorithm using particle swarm optimization with crowding distance (MCPSO-CD)
Published 2020“…According to the literature, crowding distance is one of the most efficient algorithms that was developed based on density measures to treat the problem of selection mechanism for archive updates. …”
Get full text
Get full text
Get full text
Article -
16
Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches
Published 2018“…These findings can help us develop an intelligent solution for key concept extraction in the future. …”
Get full text
Get full text
Article -
17
Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches
Published 2018“…These findings can help us develop an intelligent solution for key concept extraction in the future. …”
Get full text
Get full text
Article -
18
Autonomous Robot Navigation in Unknown Maze Environment
Published 2012“…The objective of this project is to design and develop an autonomous robot navigation using a selected algorithm which is pledge algorithm by using the concept of obstacle avoidance besides studying its accuracy to solve the given environment. …”
Get full text
Get full text
Final Year Project -
19
Steganography based on utilizing more surrounding pixels
Published 2010“…Conventional LSB method’s concept is used as the benchmark for the proposed algorithms. …”
Get full text
Get full text
Thesis -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article
