Search Results - (( evolution classification mining algorithm ) OR ( program implementation some algorithm ))

Refine Results
  1. 1

    Classification of Immunosignature Using Random Forests for Cancer Diagnosis by Zarzar, Mouayad, Razak, Eliza, Htike@Muhammad Yusof, Zaw Zaw, Yusof, Faridah

    Published 2015
    “…To attain this essential research purpose, a minimum set of genes that can assure higher performance in classification using data mining algorithms need to be detected. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…The proposed algorithm is grounded on the two famous metaheuristic algorithms: cuckoo search (CS) and covariance matrix adaptation evolution strategy (CMA-es). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
    Get full text
    Get full text
    Article
  4. 4

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…For that purpose, we use data mining techniques. Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Implementation of an autonomous mobile robot navigation algorithm using C language by Subra Mullisi, Shafeq Marwan

    Published 2009
    “…The objective of the project is to develop navigation algorithm for the autonomous mobile robot. After that, implement the navigation algorithm on the mobile robot and without using the external sensor for navigation of the mobile robot to reach the specified point. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Comparison of Some Numerical Methods for Solving Real-Life Nonlinear Equations by Using Python Programming / Annie Gorgey ... [et al.] by Gorgey, Annie, Zulkifly, Zul Hafiezy, Hassim, Haslinah, Azim, Farah Adilla

    Published 2024
    “…The study suggests extending investigations to Algorithm 1 refinement, comparative studies on various equation types, exploration of hybrid methods, real-world application and validation, and user-friendly implementation.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Ray Casting for Iso-surface in Volumetric Data by Ngoc Anh, Do Hoang

    Published 2005
    “…It is opento improve for implementation on multiprocessors. The thesis will compare some existing algorithms for ray casting in terms of image quality, computing time, complexity and so forth. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Security analysis of blowfish algorithm by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round.C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
    Get full text
    Get full text
    Thesis