Search Results - (( development programmes modified algorithm ) OR ( java classification problem algorithm ))
Search alternatives:
- development programmes »
- classification problem »
- java classification »
- problem algorithm »
-
1
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…Increase of hearth problem in this world is rising each day. Classification system for heart disease is a system that able to justify whether a patient has heart problem or not. …”
Get full text
Get full text
Thesis -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…So, the integration of Artificial Neural Network (ANN) with an Expert System for material classification was explored. The computational tool, Matlab was proposed for classification with Levenberg-Marquardt training algorithm, which provided faster rate of convergence for feed forward network. …”
Get full text
Get full text
Thesis -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
8
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
9
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Adaptive background reconstruction for street surveillance
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
12
Parallel computation of maass cusp forms using mathematica
Published 2013“…This parallel programme is further modified using a generalized Hejhal’s algorithm to cater for fundamental domain that has several cusps namely the principal congruence subgroup of level two. …”
Get full text
Get full text
Thesis -
13
A Malay Chatterbot
Published 2005“…AIML is open source software, a great advantage for the project since the software can be freely used and, if necessary, modified. The simplicity of AIML makes it easy for non-programmers, especially those who already knowHTML, to get started writing chat robots.…”
Get full text
Get full text
Final Year Project -
14
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…It also provides a flexible interface for kernel developers which facilitates the evaluation and testing for their newly developed scheduling algorithms. …”
Get full text
Get full text
Thesis -
15
Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
16
Nonlinear three-dimensional finite elements for composite concrete beams
Published 2012“…Therefore in this study, new interface elements have been developed,while modified constitutive law have been applied and new computational algorithm is utilised. …”
Get full text
Get full text
Thesis -
17
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. This scalar multiplication algorithm is named Q-NAF scalar multiplication for binary curve over Lopez-Dahab coordinates. …”
Get full text
Get full text
Thesis -
18
Optimal load management strategy for enhanced time of use (ETOU) electricity tariff in Peninsular Malaysia / Mohamad Fani Sulaima
Published 2020“…A novel method was developed by integrating a modified energy audit procedure with decision tree technique to determine the percentage of controlled loads available for LM, and the optimal LM weightage. …”
Get full text
Get full text
Thesis -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article
