Search Results - (( evolution optimization mining algorithm ) OR ( java communication through algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…During the retrieval phase, a new activation function and Swarm Mutation were proposed to ensure the diversity of the neuron states. The proposed algorithm and mutation mechanism showed optimal performances as compared to the existing algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Logic mining method via hybrid discrete hopfield neural network by Guo, Yueling, Mohd Kasihmuddin, Mohd Shareduwan, Zamri, Nur Ezlin, Li, Jia, Romli, Nurul Atiqah, Mansor, Mohd Asyraf, Ruzai, Wan Nur Aqlili

    Published 2025
    “…The first contribution involves the incorporation of a Hybrid Differential Evolution Algorithm to accelerate the optimization of synaptic weights during the training phase. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…The experimental results show that predictive FDT algorithm can generate a relatively optimal tree without much computation effort (comprehensibility), and WFPRs have a better predictive accuracy of stock market time series data. …”
    Get full text
    Get full text
    Article
  6. 6

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Descriptive analysis of patient diet trends at Pantai Hospital Ayer Keroh by Muhidin, Nurain Fatiha

    Published 2025
    “…Without effective data analysis, it is challenging to track dietary trends, assess patient preferences, and optimize meal preparation. To address this problem, this project focuses on enhancing various aspects of healthcare dietary operations by employing CRISP-DM as the methodology to structure the data mining process. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Political analysts often communicate with the public and exchange information through the social media platform. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…While the UOCC AR mobile application allow users to view machining setup process through Augmented Reality guide therefore improving the average operating time for experienced users (42.46%) and non-experienced (28.36%). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis