Search Results - (( evolution classification methods algorithm ) OR ( java implementation mechanism algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…The third method is the hybridization of BPSO and Binary Differential Evolution, namely Binary Particle Swarm Optimization Differential Evolution (BPSODE). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Feature selection optimization using hybrid relief-f with self-adaptive differential evolution by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Ahmad Nazri, Azree Shahrel, Mohamed, Raihani, Abd Manaf, Syaifulnizam

    Published 2017
    “…Hence, feature selection is embedded to select the most meaningful features based on their rank. Differential evolution (DE) is one of the evolutionary algorithms that are widely used in various classification domains. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Genetic ensemble biased ARTMAP method of ECG-Based emotion classification by Loo, C.K., Liew, W.S., Sayeed, M.S.

    Published 2012
    “…This study is an attempt to design a method for an autonomous pattern classification and recognition system for emotion recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A New Co-Evolution Binary Particle Swarm Optimization With Multiple Inertia Weight Strategy For Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…To examine the effectiveness of proposed method, four recent and popular feature selection methods namely BPSO, genetic algorithm (GA), binary gravitational search algorithm (BGSA) and competitive binary grey wolf optimizer (CBGWO) are used in a performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Email spam classification based on deep learning methods: A review by Tusher, Ekramul Haque, Mohd Arfian, Ismail, Anis Farihan, Mat Raffei

    Published 2025
    “…Deep learning has become a potent collection of techniques for addressing intricate issues such as spam classification in recent times. A thorough literature evaluation is required to have a comprehensive overview of the current research on utilizing deep learning methods for email spam classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Artificial fish swarm optimization for multilayer network learning in classification problems by Hasan, Shafaatunnur, Tan, Swee Quo, Shamsuddin, Siti Mariyam

    Published 2012
    “…Artificial Fish Swarm Algorithm (AFSA) as one of the NIC methods is widely used for optimizing the global searching of ANN.In this study, we applied the AFSA method to improve the Multilayer Perceptron (MLP) learning for promising accuracy in various classification problems.The parameters of AFSA: AFSA prey, AFSA swarm and AFSA follow are implemented on the MLP network for improving the accuracy of various classification datasets from UCI machine learning. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Artificial Fish Swarm Optmization for Multilayernetwork Learning in Classification Problems by Hasan, Shafaatunnur, Tan, Swee Quo, Shamsuddin, Siti Mariyam, Sallehuddin, Roselina

    Published 2012
    “…Artificial Fish Swarm Algorithm (AFSA) as one of the NIC methods is widely used for optimizing the global searching of ANN. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  13. 13

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  14. 14

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  15. 15

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization by Too, Jing Wei, Tee, Wei Hown, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…In the OGC framework, the exhibited explorative search behavior of the Gravitational Clustering (GC) algorithm has been addressed by (i) eliminating the agent velocity accumulation, and (ii) integrating an initialization method of agents using variance and median to subrogate the exploration process. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article