Search Results - (( initial evaluation mining algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…ICA is employed to determine the initial weights of ANN. The efficiency coefficient and mean square error (MSE) are used to evaluate the performance of the ICA-ANN model. …”
    Get full text
    Get full text
    Article
  2. 2

    Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem by Wong, Jerng Foong

    Published 2022
    “…In 2011, a new metaheuristic known as Strawberry algorithm (SBA) was initiated. Since then, it has been vastly applied to solve engineering problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance by Tan, Su Sze

    Published 2019
    “…The research methodology involves eight steps. The initial step is performed business understanding to gain insight of data mining on machine performances. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks by Farah Liyana, Azizan, Saratha, Sathasivam, Majid Khan, Majahar Ali, Nurshazneem, Roslan, Caicai, Feng

    Published 2023
    “…First, we included fuzzy logic into the system to make the bipolar structure change to continuous while keeping its logic structure. Then, a Genetic Algorithm is employed to optimise the solution. Finally, we return the answer to its initial bipolar form by casting it into the framework of the hybrid function between the two procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia by Lay, Usman Salihu

    Published 2019
    “…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…As a result, Android botnet can be used to initiate various distributed coordinated attacks including spam emails, click frauds, bitcoins mining, distributed denial of service attacks disseminating other malware and much more. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm by Ahmadi, Seyedeh Parisa

    Published 2018
    “…This study concluded that remote sensing approach combined with data mining approaches such as ANN algorithms have great potential in monitoring vast plantation areas in a rapid and inexpensive manner.…”
    Get full text
    Get full text
    Get full text
    Thesis