Search Results - (( java application pollination algorithm ) OR ( set validation using algorithm ))
Search alternatives:
- pollination algorithm »
- java application »
- validation using »
- using algorithm »
- set validation »
-
1
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
2
A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport
Published 2017“…However, manual debugging is still widely used in post-silicon validation and is a major bottleneck in the validation process. …”
Get full text
Get full text
Thesis -
3
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…The rest sets of experiments carried out to evaluate the proposed algorithms. …”
Get full text
Get full text
Thesis -
4
-
5
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
6
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
7
Optimized clustering with modified K-means algorithm
Published 2021“…Besides, some real data sets were examined to validate the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017“…The performance of these face recognition algorithms will be evaluated by 10-fold cross validation using ORL database. …”
Get full text
Get full text
Monograph -
9
An adaptive flower pollination algorithm for minimizing software testing redundancy
Published 2017“…Comparison shows that our algorithm performs slightly better than the existing algorithms and thus, the proposed algorithm can potentially be used by researchers and test engineers to obtain optimal test suite requiring the minimum time for software testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…In this study, 227 volumes of brain CT images were used to develop and validate the CAD. The new develop algorithm is set to register image of brain patient in order to determine the rotation angle for brain realignment. …”
Get full text
Get full text
Thesis -
11
-
12
Prediction of blood-brain barrier permeability of compounds by machine learning algorithms
Published 2024“…Since the CNS is often inaccessible to many complex procedures and performing in-vitro permeability studies for thousands of compounds can be laborious, attempts were made to predict the permeation of compounds through BBB by implementing the Machine Learning (ML) approach. In this work, using the KNIME Analytics platform, 4 predictive models were developed with 4 ML algorithms followed by a ten-fold cross-validation approach to predict the external validation set. …”
Get full text
Get full text
Get full text
Article -
13
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method can be used for preparing of current data bank that is very useful for considering on lightning effects on the power lines and setting appropriate protection levels on the power systems.…”
Get full text
Get full text
Article -
14
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012“…The performance of our algorithm is confirmed through simulations and validated against two leading CDS algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
An Apriori-based Data Analysis on Suspicious Network Event Recognition
Published 2019“…Apriori-based rule generators, which are powered by the DIS-Apriori algorithm and the NIS-Apriori algorithm, are applied to analyze the data sets available in the IEEE BigData 2019 Cup: Suspicious Network Event Recognition. …”
Get full text
Get full text
Conference or Workshop Item -
16
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…To address this, missing customer IDs are filled with the last valid ID, assuming repeated purchases. The FP-Growth algorithm was found to be faster and more effective than the Apriori algorithm in extracting frequent item sets and generating association rules. …”
Get full text
Get full text
Article -
17
Meta-requirement method towards analyzing completeness of requirements specification
Published 2018“…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
Get full text
Get full text
Get full text
Book Chapter -
18
Proposal of meta-requirement approach to analyze requirements specification completeness
Published 2018“…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
Get full text
Get full text
Conference or Workshop Item -
19
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021“…This paper provides an empirical study report, that building price predictions are based on green building and other general determinants. This experiment used five common machine learning algorithms namely 1) Linear Regressor, 2) Decision Tree Regressor, 3) Random Forest Regressor, 4) Ridge Regressor and 5) Lasso Regressor tested on a real estate data-set of covering Kuala Lumpur District, Malaysia. 3 set of experiments was conducted based on the different feature selections and purposes The results show that the implementation of 16 variables based on Experiment 2 has given a promising effect on the model compare the other experiment, and the Random Forest Regressor by using the Split approach for training and validating data-set outperformed other algorithms compared to Cross-Validation approach. …”
Get full text
Get full text
Conference or Workshop Item -
20
Switching algorithm to avoid attitude representation singularity
Published 2009“…The algorithm is numerically demonstrated and validated by several nonlinear six degree of freedom simulation tests.…”
Get full text
Get full text
Get full text
Proceeding Paper
