Search Results - (( development fund function algorithm ) OR ( java learning classification algorithm ))
Search alternatives:
- function algorithm »
- development fund »
- fund function »
- java learning »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
3
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
4
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
5
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024Conference Paper -
6
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
8
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
9
Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system
Published 2019“…The performance of the developed algorithms are tested on various benchmark functions for both single and multiobjective type problems. …”
Get full text
Get full text
Research Report -
10
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
12
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…The multi-faceted objectives consist of the bank‟s expected returns and risks tolerance with constraints (also known as restraining functions to reflect the limitations placed on the Islamic bank‟s operating requirements), established using computational mathematics and algorithms with the aid of the MATLAB programming software. …”
Get full text
Get full text
Get full text
Thesis
