Search Results - (( development formal function algorithm ) OR ( java learning classification algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
    Get full text
    Get full text
    Thesis
  8. 8

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…Therefore, it is essential to determine control system safety in advance by verifying the possibility of state transitions from safe to unsafe states at the design and development stage. To overcome these issues, many researchers and engineers have been involved in formal methods research. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  10. 10

    The nonlinear fabry-perot resonator: direct numerical integration by Chew, Khian Hooi, Tilley, D.R., Osman, J.

    Published 2001
    “…The optical polarization P, rather than the optical E field, is retained as the dynamical variable. We develop an algorithm for integration of the nonlinear wave equation in P and with addition of the nonlinear boundary conditions at the resonator surfaces we are able to find the transmission as a function of intensity and frequency. …”
    Get full text
    Get full text
    Article
  11. 11

    Method of Event Reconstruction in Digital Investigation and its Visualization by Abdullah, Mohd. Taufik

    Published 2011
    “…An algorithm is developed to derive a Deterministic Finite Automaton (DFA) that accepts computations of FSM that represent the functionality of system under investigation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…Currently, there is no ontology which is developed specify in metabolic pathway domain. Therefore, the main objective of this research is to develop an ontology-based representation for metabolic pathway to represent and to describe the concepts in the metabolic pathway domain and the relationships among them. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An improved marine predators algorithm tuned data-driven multiple-node hormone regulation neuroendocrine-PID controller for multi-input–multi-output gantry crane system by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Helmi, Suid, Mohd Riduwan, Ghazali, M Osman, Tokhi

    Published 2023
    “…Comparative findings alongside other existing metaheuristic-based algorithms confirmed excellence of the proposed method through its superior performance against the conventional MPA, particle swarm optimization (PSO), grey wolf optimizer (GWO), moth-flame optimization (MFO), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), salp-swarm algorithm (SSA), slime mould algorithm (SMA), flow direction algorithm (FDA), and the formally published adaptive safe experimentation dynamics (ASED)-based methods.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Fuzzy methodologies for automated University timetabling solution construction and evaluation by Asmuni, Hishammuddin

    Published 2008
    “…New algorithms to calculate what is loosely termed the lower limits and upper limits of the proximity cost function for any problem instance are also presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Performance analysis of predictive functional control for automobile adaptive cruise control system by Zainuddin, Mohamed Al-Sideque, Abdullah, Muhammad, Ahmad, Salmiah, Uzair, Mohd Suhaimi, Ahmad Baidowi, Zaid Mujaiyid Putra

    Published 2023
    “…Thus, the findings from this work can become a good initial motivation to explore further the capability of the PFC algorithm for future ACC development.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Outlier Detections and Robust Estimation Methods for Nonlinear Regression Model Having Autocorrelated and Heteroscedastic Errors by Riazoshams, Hossein

    Published 2010
    “…Finally, we proposed statistics practitioners to use the formal modeling algorithms to get better inferences. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…We model the solution in the real setting of SDNs using High Level Petri Nets (HLPN), analyze the rules with Z language, and formally verified the correct functioning using Z3 SMT solver. …”
    Get full text
    Get full text
    Thesis