Search Results - (( its activation selection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images by Jamaludin, Shahrizan, Mohamad Ayob, Ahmad Faisal, Mohd Norzeli, Syamimi, Mohamed, Saiful Bahri

    Published 2022
    “…The findings revealed that the algorithm outperformed the other active contour-based approaches in computational time and segmentation accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  9. 9

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…The system is able to update the information from the database provided that the administrator monitors its activities periodically. This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…A good clustering method groups similar compounds together, to ensure all activity classes are represented, whilst separating active and inactive compounds into different sets of clusters, to avoid an inactive compound being selected as a cluster representative. …”
    Get full text
    Get full text
    Monograph
  11. 11

    A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. The approach is based on optimization of selected test case from test suite T. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Decoding of visual activity patterns from fMRI responses using multivariate pattern analyses and convolutional neural network by Zafar, R., Kamel, N., Naufal, M., Malik, A.S., Dass, S.C., Ahmad, R.F., Abdullah, J.M., Reza, F.

    Published 2017
    “…Selection of significant features is an important part of fMRI data analysis, since it reduces the computational burden and improves the prediction performance; significant features are selected using t -test. …”
    Get full text
    Get full text
    Article
  13. 13

    LASSO-type estimations for threshold autoregressive and heteroscedastic time series models. by Muhammad Jaffri Mohd Nasir

    Published 2020
    “…In this thesis, we propose Least Absolute Shrinkage and Selection Operator (LASSO) type estimators to perform simultaneous parameter estimation and model selection for five specific univariate and multivariate time series models, and develop several algorithms to compute these estimators. …”
    Get full text
    Get full text
    UMK Etheses
  14. 14

    Clustering of Chemical Compounds using Unsupervised Neural Networks Algorithms: a comparison by Zeb Shah, Jehan, Salim, Naomie

    Published 2006
    “…The results show that the Wards and Group Average methods are equally good; however, the performance of Kohonen neural selforganizing maps (SOM) is also important due to its almost similar performance as the hierarchical clustering methods with the advantage of its efficiency.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Clustering of chemical compounds using unsupervised neural networks algorithms : a comparison by Zeb Shah, Jehan, Salim, Naomie

    Published 2006
    “…The results show that the Wards and Group Average methods are equally good; however, the performance of Kohonen neural selforganizing maps (SOM) is also important due to its almost similar performance as the hierarchical clustering methods with the advantage of its efficiency…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…Novel feature selection techniques have been developed due to its importance in network intrusion domain. …”
    Get full text
    Get full text
    Article
  17. 17

    An Automated Summarization Assessment Algorithm for Identifying Summarizing Strategies by Abdi, A., Idris, N., Alguliyev, R.M., Aliguliyev, R.M.

    Published 2016
    “…An innovative aspect of our algorithm lies in its ability to identify summarizing strategies at the syntactic and semantic levels. …”
    Get full text
    Get full text
    Article
  18. 18

    Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours by Kalid Abdlkader Marsal Salih

    Published 2024
    “…Then, the enhancement clustering algorithm will be constructed based on correlated degree which is selected as a cluster head to serves as a link connectivity between individual node and its neighbor to form network clustering. …”
    thesis::doctoral thesis
  19. 19

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  20. 20

    Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization by Pang, Jia Hong

    Published 2011
    “…The genetic algorithms is proven to be a very effective method in optimization by using the way imitating natural process of living beings such as crossover, mutation and selection. …”
    Get full text
    Get full text
    Thesis