Search Results - (( development concept selection algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…Overall, the developed algorithms have similar PSNR value and lower average search point compared to superior algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…The basic concept of the GA is the natural selection and survival of the fittest, which is identical to the human genetic. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Being that feature subset selection is considered a multi-objective optimization problem, this study proposed the Rao-SVM as an FSS mechanism; its algorithm-specific and parameter-less concept was also explored. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Genetic algorithm based ensemble framework for sentiment analysis by Lai, Po Hung

    Published 2018
    “…Prior to developing the whole multilayered ensemble framework, two separate experiments were performed to evaluate and study the different methods of feature extraction and selection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Transport route optimization using genetic algorithm by Kho, Evie Siaw Hei.

    Published 2004
    “…Genetic Algorithm, a branch in artificial intelligence, applies the concept of selection, crossover and mutation in genetic discipline, is used as the backend engine in this program to optimize a given route.…”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Suitability Factor on the Capacitated Vehicle Routing Problem by Md Rais, Helmi, Ali Othman, Zulaiha, Hamdan, Abdul Razak

    Published 2010
    “…A new variant of algorithm called Dynamic Ant Colony System with Three Level Updates (DACS3) has been developed which focuses on adding individual ant behavior. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A proposed model for the selection of workers on crowdsourcing platforms utilizing nested criteria matching by Cucus, Ahmad, Mubarak Ali, Al-Fahim, Zafril Rizal, M. Azmi

    Published 2024
    “…The objective of this study is to examine the concept of crowdsourcing and the corresponding method for employee selection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering by Rashed, Alwatben Batoul

    Published 2022
    “…According to the literature, crowding distance as one of the most efficient algorithms was developed based on density measures to treat the problem of selection mechanism for archive update. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi-objective clustering algorithm using particle swarm optimization with crowding distance (MCPSO-CD) by Rashed, Alwatben Batoul, Hamdan, Hazlina, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Yaakob, Razali, Abubakar, Mansir

    Published 2020
    “…According to the literature, crowding distance is one of the most efficient algorithms that was developed based on density measures to treat the problem of selection mechanism for archive updates. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches by Aman, M., Said, A.M., Kadir, S.J.A., Ullah, I.

    Published 2018
    “…These findings can help us develop an intelligent solution for key concept extraction in the future. …”
    Get full text
    Get full text
    Article
  17. 17

    Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches by Aman, M., Said, A.M., Kadir, S.J.A., Ullah, I.

    Published 2018
    “…These findings can help us develop an intelligent solution for key concept extraction in the future. …”
    Get full text
    Get full text
    Article
  18. 18

    Autonomous Robot Navigation in Unknown Maze Environment by Nur Aqilah binti Mustafa, Nur Aqilah

    Published 2012
    “…The objective of this project is to design and develop an autonomous robot navigation using a selected algorithm which is pledge algorithm by using the concept of obstacle avoidance besides studying its accuracy to solve the given environment. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Steganography based on utilizing more surrounding pixels by Afrakhteh, Masoud

    Published 2010
    “…Conventional LSB method’s concept is used as the benchmark for the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article