Search Results - (( java adaptation optimization algorithm ) OR ( basic relation new algorithm ))

Refine Results
  1. 1
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2013
    “…Hence, one protocol will be proposed to provide the key establishment. Basically the protocol uses the second order linear recurrence relation and the multiplicative group of integers modulo p. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems by Ahmad Azwan, Abdul Razak, Ahmad Nor Kasruddin, Nasir

    Published 2022
    “…In this paper, a new variant of Manta Ray Foraging Optimization (MRFO) algorithm is introduced to deal with real parameter constrained optimization problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak by Rajogoval, Illayakantthan

    Published 2022
    “…The study identified new cases, deaths, hospitalization, and ICU admission as important attributes to derive accurate COVID-19 Basic Reproduction Number, R0…”
    Get full text
    Get full text
    Monograph
  10. 10

    Exploration of educational building with cultural elements using shape grammar by Sebastian, Heng Junjie

    Published 2013
    “…During the design process, other rules are activated to embed new shapes within the basic building block. The rules are executed to generate designs to provide students a spacious environment for study and related activities. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal by Camellia , Mohd Kamal

    Published 2004
    “…For Perception there will be the Description Neuron Model, Perceptron Basic Architecture and perceptron Algorithm with one example of solved problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Reproducing kernel Hilbert space method for cox proportional hazard model by Abdul Manaf, Nur'azah

    Published 2016
    “…Finally, we propose an algorithm of minimization of the loss function in the general Cox model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Modeling and design control strategy for unwind/rewind system by Ismail, Muhamad Fahezal

    Published 2008
    “…This project was replaced the PLC to computer controlled method. A new control algorithm that based on the regulator feedback was proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…The literature is replete with many localization and calibration algorithms that basically rely on some a-priori chosen nodes, called seeds, with known coordinates to help determine the network topology. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fuzzy C means imputation of missing values with ant colony optimization by Mausor, F.H., Jaafar, J., Mohdtaib, S.

    Published 2020
    “…This paper proposes a improved method of imputation by employing a new version of Fuzzy c Means (FCM) which hybridized with Evolutionary Algorithm to handle missing values problem. …”
    Get full text
    Get full text
    Article
  17. 17

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing by Alsaadi, Alaa Abdullah Mohammed

    Published 2020
    “…The main objective of this thesis is to develop a new technique for phase noise, accuracy and complexity in OFDM signal. …”
    Get full text
    Get full text
    Thesis
  19. 19

    3D spatial operations in geo DBMS environment for 3D GIS by Chen, Tet Khuan, Abdul Rahman, Alias

    Published 2007
    “…To formulate this research in a suitable way, our approach is to develop the new 3D data type, polyhedron, within geo-DBMS. The basic idea is to relate the implementation of intersection point in 3D planar polygon (Chen and Abdul-Rahman, 2006) into the geometrical modeling for 3D spatial operations. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Development of rule-based advisory system from modified hazard and operability study on fatty acid fractionation column by M. Yunus, M. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Microsoft AccessTM and Visual BasicTM have been used to develop the knowledge-based and the inference engine respectively. …”
    Get full text
    Get full text
    Conference or Workshop Item