Search Results - (( java application learning algorithm ) OR ( data integration data algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Numerical Integration And Data Reduction For Application In Photometry by Chew, Tong Fatt

    Published 2003
    “…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Load and service adaptive algorithm (LSAA) for tight coupling based integration architecture by Aziz, A., Saad, N.M.

    Published 2014
    “…In order to fulfill the anywhere at any time data services demand, integration of existing wireless networks has attained the tremendous attention in last decades. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…From this, the spatial criteria scheme data is produced. The MCDM-AHP algorithm is applied to the criteria scheme data to identify the number of RES sites. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Data tampering avoidance for food supply chain traceability system using blockchain technology by Rosli, Fahrulrazi

    Published 2019
    “…The results showed that the algorithm was able to preserve data integrity up to 100% accuracy.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The results showed that the algorithm was able to preserving data integrity with 99.13% and up to 100% accuracy.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluating integrated weight linear method to class imbalanced learning in video data by Mohd Apandi, Ziti Fariha, Mustapha, Norwati, Affendey, Lilly Suriani

    Published 2011
    “…This paper proposed an Integrated Weight Linear (IWL) method that integrate weight linear algorithm (WL) with principle component analysis (PCA) to eliminate imbalanced dataset in soccer video data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Design and development of hybrid integrated thermal aware job scheduling on computational grid environment by Haruna, A.A., Jung, L.T., Zakaria, N.

    Published 2016
    “…In this paper a Hybrid Integrated Thermal Aware Scheduling Algorithms are proposed based on baseline approaches. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm by Abdolrasol M.G.M., Ker P.J., Hannan M.A., Ayob A., Tiong S.K.

    Published 2024
    “…Weather data, including wind, solar, fuel, and battery status, is integrated into the BGD algorithm for optimizing ON and OFF schedules. …”
    Conference Paper
  20. 20

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item