Search Results - (( development course normalization algorithm ) OR ( java pattern classification algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design and development of elective courses recommender system (ECORS) by Eng, Pei Wen

    Published 2017
    “…This creates a final normalized score for each course. Ultimately, the courses with the highest interest scoring are passed on to the User Interface. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Lane detection system for autonomous vehicle using image processing techniques by Mohd Kiblee, Shahizul Eza

    Published 2005
    “…A Radon peak detection algorithm was developed based on two values, Rand O. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Article
  6. 6

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Graphing calculator exposure of mathematics learning in a partially technology incorporated environment by Kharuddin, Azrul Fazwan, Ismail, Noor Azina

    Published 2017
    “…In some universities where paper and pencil examination is the major assessment tool, undergraduate mathematics courses are still taught in a traditional manner that takes care of the algorithmic and procedural steps. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development Of Finite Element Codes For Shear Wall Analysis by Paknahad, Masoud

    Published 2008
    “…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
    Get full text
    Get full text
    Thesis