Search Results - (( development formal using algorithm ) OR ( java optimization method algorithm ))

Refine Results
  1. 1

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimize class time tabling by using genetic algorithm technique in UTHM by Ahmad, Izah Rafidah

    Published 2019
    “…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA) by Hasni, Hassan, Aznida Hayati, Zakaria@Mohamad, Mohd Isa, Awang, Mokhairi, Makhtar, Rohana, Ismail, Fadhilah, Ahmad

    Published 2017
    “…However, the focus of the paper is on a method proposed to extract adjacency matrix from concepts obtained from the theory of Formal Concept Analysis (FCA) using two consecutive algorithms called the Relatedness Algorithm and Adjacency Matrix Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…In addition, the improved WOA is developed by using Cauchy mutation and local search algorithm to solve its local optima problem and improve population diversity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…An inappropriate selection of materials for engineering component would result in entire product failure which ultimately has a negative impact on the society. Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Solving ump examination timetabling problem using dynamic exploration step counting hill climbing algorithm by Chang, Ling Shing

    Published 2022
    “…Then, the initial solution is improved using our enhanced algorithm called dynamic exploration step counting hill climbing (DESCHC). …”
    Get full text
    Get full text
    Thesis
  17. 17

    A framework for classification software security using common vulnerabilities and exposures by Hassan, Nor Hafeizah

    Published 2018
    “…The main research aim is to investigate what information is necessary to make a formal vulnerability pattern representation.This is done through the usage of formal Backus-Naur-Form syntax for the execution and presented with newly created vulnerability flow diagram.Some future works were also proposed to further enhance the elements in the secured soft-ware process framework.This thesis focuses on the research and development of the design, formalization and translation of the vulnerability classification pattern through a framework using common vulnerabilities and exposures data.To achieve this aim, the following work was carried out.First step is to create and conceptualized necessary meta-process.Second step is to specify the relationship between the classifiers and vulnerability classification pat-terns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data by Mohd Rahim, Mohd Shafry

    Published 2008
    “…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  20. 20