Search Results - (( java application customization algorithm ) OR ( construct selection techniques algorithm ))

Refine Results
  1. 1

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…The proposed improvement includes: (i) an ACO feature clustering method to obtain clusters of highly correlated features; (ii) an adaptive selection technique for subset construction from the clusters of features; and (iii) a genetic-based method for producing the final subset of features. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Land Cover Mapping in Jeli Using Selected Classification Algorithms by Syaza Sholimin

    Published 2013
    “…This research focused on comparing which are the best selected classification algorithms in producing land cover map with reference to the confusion matrix and kappa statistic. …”
    Get full text
    Undergraduate Final Project Report
  3. 3

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…When classifying tissue samples, gene selection plays an important role. In this research, some existing gene selection techniques are studied and better gene selection techniques are proposed and developed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules by Rizauddin, Saian

    Published 2013
    “…The second proposed algorithm uses SA to optimize the terms selection while constructing a rule. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Supplier selection for contractors using Fuzzy TOPSIS Algorithm / Mohamed Shafiq Mohamed Yusof by Mohamed Yusof, Mohamed Shafiq

    Published 2020
    “…The main objective of this study is to develop a system which is supplier selection by using Fuzzy Technique of Order Preference Similarity to the Ideal Solution (Fuzzy TOPSIS). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automated Examination Timetabling System (AETSys) / Ariff Md Ab Malik by Md Ab Malik, Ariff, Haruddin, Hanitahaiza, Alwi, Anisah, Mohamed, Khainizam

    Published 2013
    “…The main core of the technique of this system is Tabu Search algorithms that have been applied with several state-of-the-art strategies such as adaptive switcher mechanism and stratified descent selection mechanism. …”
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9
  10. 10
  11. 11

    Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.] by Mat, Nur Haziqah, Ahmad Zahida, Athifa Aisha, Abdul Malik, Siti Nurhaliza, Azmadi, Nur Athirah Syuhada, Senin, Syahrul Fithry

    Published 2021
    “…The demand of experienced inspectors also presents a challenge for the pressing lack of highly skilled and experienced construction inspectors. To overcome the issues, datasets of reinforced concrete damage images are intelligently trained and classified by selected Machine Learning algorithms such as Naïve- Bayesian, Discriminant Analysis, K-Nearest Neighbor, and Support Vector Machine. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The purpose of this research is to analysed the algorithm techniques and illustrate how the technique solves these problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques by Qtaish, Osama Kayed Taher

    Published 2014
    “…First, the runtime path prediction method predicts, at runtime, and just before the actual composition, execution, the execution path that will potentially be executed. Second, both the constructive procedure (CP) and the complementary procedure (CCP) heuristic algorithms computed the optimization considering only the execution path that has been predicted by the runtime path prediction method for criteria selection, eight QoS characteristics are suggested after investigating related works on the area of web service and web service composition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem by Odili, Julius Beneoluchi, Noraziah, Ahmad, Zarina, M.

    Published 2021
    “…The comparative algorithms in this study employ different techniques in their search for solutions to ATSP: the African Buffalo Optimization employs the modified Karp–Steele mechanism, Model-Induced Max-Min Ant Colony Optimization (MIMM-ACO) employs the path construction with patching technique, Cooperative Genetic Ant System uses natural selection and ordering; Randomized Insertion Algorithm uses the random insertion approach, and the Improved Extremal Optimization uses the grid search strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition by Ali Yahya, Anwar

    Published 2007
    “…In the selection phase, a new variable length genetic algorithm is applied to select the lexical cues. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Impact of data balancing and feature selection on machine learning based network intrusion detection by Barkah, Azhari Shouni, Selamat, Siti Rahayu, Zainal Abidin, Zaheera, Wahyudi, Rizki

    Published 2023
    “…Synthetic Minority Oversampling Technique (SMOTE) and Adaptive Synthetic (ADASYN) algorithms duplicate the data and construct synthetic data for the minority classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  18. 18

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The state-of-the-art shows that most of the feature reduction techniques, if not all, which have been implemented for the damage detection are feature selection not extraction. …”
    Get full text
    Get full text
    Thesis