Search Results - (( java application customization algorithm ) OR ( knowledge utilization method algorithm ))
Search alternatives:
- customization algorithm »
- utilization method »
- java application »
- method algorithm »
-
1
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…One of the key issues of developing an autonomous system is that it requires pre-defined knowledge by an expert. This knowledge is then converted into computer program or by utilizing exhaustively trained and tested Artificial Intelligence (AI) algorithm. …”
Get full text
Get full text
Thesis -
3
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
4
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…The proposed methods can be utilized as another option to solve a decision making problem.…”
Get full text
Get full text
Thesis -
5
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
6
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…However, in this thesis, the algorithm based on inspiration of the honeybee’s behavior is improved to manage and improve energy utilization of the mobile multi-robot to emulate the working and foraging behavior. …”
Get full text
Get full text
Thesis -
7
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…This study utilizes genetic algorithms based upon the medoid rather than the mean as a centroid-selection schema to improve the clustering efficiency. …”
Get full text
Get full text
Thesis -
8
Determining number of clusters using firefly algorithm with cluster merging for text clustering
Published 2015“…Such a scenario requires a dynamic text clustering method that operates without initial knowledge on a data collection.In this paper, a dynamic text clustering that utilizes Firefly algorithm is introduced.The proposed, aFAmerge, clustering algorithm automatically groups text documents into the appropriate number of clusters based on the behavior of firefly and cluster merging process. …”
Get full text
Get full text
Book Section -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
GPU-based odd and even hybrid string matching algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
12
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Secondly, the feature transformation, a knowledge-based method, is utilized to pre-process the fault data. …”
Get full text
Get full text
Get full text
Article -
13
Optimizing decentralized exam timetabling with a discrete whale optimization algorithm
Published 2025“…This problem remains an active area of research and, to the authors' knowledge, has not been adequately addressed by the WOA algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…This problem remains an active area of research and, to the authors’ knowledge, has not been adequately addressed by the WOA algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Intelligent adaptive active force control of a robotic arm with embedded iterative learning algorithms
Published 2001“…Two main iterative learning algorithms are utilized in the study – the first is used to automatically tune the controller gains while the second to estimate the inertia matrix of the manipulator. …”
Get full text
Get full text
Get full text
Article -
16
Determination Of Heat Transfer Coefficients In Heat Exchangers By Genetic Algorithm
Published 2010“…Genetic algorithm (GA), developed by John Holland in the 1970s, is gaining widespread attention throughout the years. …”
Get full text
Get full text
Final Year Project -
17
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Contribution to the advancement of innovative colorectal cancer diagnostic methods and targeted therapies by applying gut mycobiome knowledge.…”
Get full text
Get full text
Get full text
Article -
18
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…In this study, an automated segmentation method that is able to fully utilize the unmanned aerial vehicle (UAV) data for extracting, and characterizing a single tree crowns with many geometric and topological properties. …”
Get full text
Get full text
Conference or Workshop Item -
19
Hybrid block method for direct numerical approximation of second order initial value problems using Taylor Series Expansions
Published 2017“…In this article, a hybrid block method is utilized for the numerical approximation of second order Initial Value Problems (IVPs). …”
Get full text
Get full text
Get full text
Article -
20
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Thus, data stream clustering is crucial for extracting hidden knowledge and data mining. Various data stream clustering methods have lately been introduced. …”
Article
