Search Results - (( java adaptation optimization algorithm ) OR ( using valued data algorithm ))
Search alternatives:
- adaptation optimization »
- java adaptation »
- data algorithm »
- using valued »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…This method basically will help to improve the storage capacity and efficiency. The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
Get full text
Get full text
Thesis -
3
Missing-values imputation algorithms for microarray gene expression data
Published 2019“…By using local and global correlation of the data, we were able to focus mostly on the differences between the algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
4
An Evaluation of Machine Learning Algorithms for Missing Values Imputation
Published 2019“…It represents the research and imputation of missing values in gene expression data. By using the local or global correlation of the data we focus mostly on the contrast of the algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…A superior performance is achieved by the proposed algorithms in system modeling where the DQLMS was able to track the correct weights values of the different modeled systems 430 sample faster than the QLMS and ZA-QLMS algorithms while the WL-DQLMS was faster than the WLQLMS algorithm by 950 samples. …”
Get full text
Get full text
Get full text
Thesis -
6
Steganography algorithm to hide secret message inside an image
Published 2011“…In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. …”
Get full text
Get full text
Article -
7
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
8
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Classifier algorithms, namely the Support Vector Machine and K-Nearest Neighbours were used for benchmarking the performance of the Real-Valued Negative Selection Algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The validation analysis produced high correlation coefficient value(> 80%). Besides that, interpolate technique was also used in this study for AOT mapping using in situ data. …”
Get full text
Get full text
Thesis -
10
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
11
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
12
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
Get full text
Get full text
Get full text
Article -
14
Extensions to the K-AMH algorithm for numerical clustering
Published 2018“…The original k-AMH algorithm for categorical values uses a simple matching dissimilarity measure, but for numerical values it uses Euclidean distance. …”
Get full text
Get full text
Get full text
Article -
15
-
16
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…On the other hand, Apriori-T with indexing enumeration tree is used for low cost FPM. A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Damageless Digital Watermarking Using Complex-valued Artificial Neural Network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
Get full text
Get full text
Thesis -
19
Damageless digital watermarking using complex-valued artificial neural network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Modeling of widely-linear quaternion valued systems using hypercomplex algorithms
Published 2015“…The data-driven optimal modeling and identification of widely-linear quaternion-valued synthetic systems is achieved by using a quaternion-valued gradient based algorithms. …”
Get full text
Get full text
Conference or Workshop Item
