Search Results - (( evolution optimization mining algorithm ) OR ( java information through algorithm ))
Search alternatives:
- evolution optimization »
- information through »
- through algorithm »
- mining algorithm »
- java information »
-
1
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…During the retrieval phase, a new activation function and Swarm Mutation were proposed to ensure the diversity of the neuron states. The proposed algorithm and mutation mechanism showed optimal performances as compared to the existing algorithms. …”
Get full text
Get full text
Thesis -
2
Logic mining method via hybrid discrete hopfield neural network
Published 2025“…The first contribution involves the incorporation of a Hybrid Differential Evolution Algorithm to accelerate the optimization of synaptic weights during the training phase. …”
Get full text
Get full text
Get full text
Article -
3
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
Get full text
Get full text
Thesis -
4
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
6
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The experimental results show that predictive FDT algorithm can generate a relatively optimal tree without much computation effort (comprehensibility), and WFPRs have a better predictive accuracy of stock market time series data. …”
Get full text
Get full text
Article -
7
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
8
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
9
Descriptive analysis of patient diet trends at Pantai Hospital Ayer Keroh
Published 2025“…Without effective data analysis, it is challenging to track dietary trends, assess patient preferences, and optimize meal preparation. To address this problem, this project focuses on enhancing various aspects of healthcare dietary operations by employing CRISP-DM as the methodology to structure the data mining process. …”
Get full text
Get full text
Student Project -
10
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Political analysts often communicate with the public and exchange information through the social media platform. Their activities (otherwise termed cyber-trooping) could have either positive, negative, or neutral feedbacks (perceptions) in the public space. …”
Get full text
Get full text
Get full text
Thesis -
12
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
13
Challenges of hidden data in the unused area two within executable files
Published 2009“…Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). …”
Get full text
Get full text
Get full text
Article -
14
-
15
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. …”
Get full text
Get full text
Thesis -
16
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…To collect data, we enlisted the help of 4,500 people. We collect information on 23 asthma-related characteristics. We utilized eight robust machine learning algorithms to analyze this dataset. …”
Get full text
Get full text
Get full text
Article -
17
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
18
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Thesis -
19
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. Energy efficient iPath (E-iPath) is evaluated with several variations of nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Get full text
Article
