Search Results - (( java application customization algorithm ) OR ( mere classification using algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    On the exploration and exploitation in popular swarm-based metaheuristic algorithms by Hussain, Kashif, Mohd Salleh, Mohd Najib, Cheng, Shi, Shi, Yuhui

    Published 2018
    “…This study, therefore, performed in-depth empirical analysis by quantitatively analyzing exploration and exploitation of five swarm-based metaheuristic algorithms. The analysis unearthed explanations the way algorithms performed on numerical problems as well as on real-world application of classification using adaptive neuro-fuzzy inference system (ANFIS) trained by selected metaheuristics. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Classification Modeling for Malaysian Blooming Flower Images Using Neural Networks by Muhammad Ashraq, Salahuddin

    Published 2013
    “…The appearance of the image itself such as variation of lights due to different lighting condition, shadow effect on the object’s surface, size, shape, rotation and position, background clutter, states of blooming or budding may affect the utilized classification techniques. This study aims to develop a classification model for Malaysian blooming flowers using neural network with the back propagation algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…The classification accuracy and the area under the ROC curve measurements provided an acceptable evaluation of the fact that the discovered relay decision algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimisation of neural network with simultaneous feature selection and network prunning using evolutionary algorithm by WK Wong, Ali Chekima, Wong, Kii Ing, Law, Kah Haw, Lee, Vincent

    Published 2015
    “…Most advances on the Evolutionary Algorithm optimisation of Neural Network are on recurrent neural network using the NEAT optimisation method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. …”
    Get full text
    Get full text
    Thesis