Search Results - (( java data classification algorithm ) OR ( using iterative based algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Iteration strategy and ts effect towards the performance of population based metaheuristics by Nor Azlina, Ab. Aziz, Nor Hidayati, Abdul Aziz, Azlan, Abd Aziz, Tasiransurini, Abdul Rahman, Wan Zakiah, Wan Ismail, Zuwairie, Ibrahim

    Published 2020
    “…Three parent algorithms, namely, particle swarm optimization (PSO), gravitational search algorithm (GSA), and simulated Kalman filter (SKF) are used in this work to find a general pattern of the effect of iteration strategy towards the performance of population-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An adaptively switching iteration strategy for population based metaheuristics / Nor Azlina Ab. Aziz by Nor Azlina, Ab. Aziz

    Published 2017
    “…Experiments conducted using three parent algorithms namely particle swarm optimization (PSO), which is a popular population-based optimizer with population and individual memories, gravitational search algorithm (GSA), a memoryless young optimizer, and simulated Kalman filter (SKF), a newly introduced optimization algorithm that use population’s memory to guide an agent’s search, show that iteration strategy is an algorithm dependent parameter as well as function dependent. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Major problems in classification task are large amount of training data, large number of features and different behavior of data streams that reduce accuracy and increase computational cost in classifier training phase. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithm solution for space-fractional diffusion equations by Agus Sunarto, Jumat Sulaiman

    Published 2020
    “…Based on numerical results of the proposed iterative method, it can be concluded that the proposed iterative method is superior to the FSAOR and HSAOR iterative method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    New Quarter-Sweep-Based Accelerated Over-Relaxation Iterative Algorithms and their Parallel Implementations in Solving the 2D Poisson Equation by Rakhimov, Shukhrat

    Published 2010
    “…The parallel strategies used in the new algorithms are based on the message latency minimization and processor-independent iterations.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography by Tian, Wenbin, Ramli, Mimi Faisyalini, Yang, Wuqiang, Sun, Jiangtao

    Published 2020
    “…It is crucial to select a suitable relaxation factor in iterative image reconstruction algorithms (e.g. Landweber iterative algorithm) for electrical capacitance tomography (ECT) because it affects the convergence. …”
    Get full text
    Get full text
    Article
  12. 12

    Optimization Of Pid Controller For Double-Link Flexible Robotic Manipulator Using Metaheuristic Algorithms by Annisa, Jamali, Intan Zaurah, Mat Darus, Hanim, Mohd Yatim, Mat Hussin, Ab Talib

    Published 2019
    “…This paper investigates the optimization approach of PID controller for double-link flexible robotic manipulator using metaheuristic algorithm. This research focus on population-based metaheuristic that is particle swarm optimization (PSO) and artificial bees algorithm (ABC) to tune the PID control parameters of the system. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13

    Iterative spatial sectoring algorithm: a computer based approach to determining area of irregular closed space and tumor volume by Aboaba, Abdulfattah A., Hameed, Shihab Ahmed, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Harun, Rahmat H., Mohd Zain, Nurzaini Rose

    Published 2011
    “…The approximation made at the stage of finding the area would affect the determination of brain tumor volume and shape when it is eventually used in its calculation. The Iterative Spatial Sectoring algorithm presented in this paper is the stepwise approach of a novel idea leading to precise determination of area of irregular snaky edged close space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    Imputing incomplete software metric database using iterative nearest neighbour based algorithm by Wasito, Ito, Ab. Azid, Nurul Farihan

    Published 2008
    “…The purpose of this paper is to review and implement the iterative nearest neighbour based data imputation technique for handling incomplete software metric database. …”
    Get full text
    Get full text
    Article
  16. 16

    Augmented model based double iterative loop techniques for integrated system optimisation and parameter estimation of large scale industrial processes by Normah Abdullah, Brdys, M.A., Roberts, P.D.

    Published 1993
    “…The methods incorporate integrated system optimisation and parameter estimation which utilizes process measurements to achieve real process optimality inspite of model reality differences. The double iterative loop structures of the proposed algorithms use the real process measurement within the outer loops while the inner loops involve model based computation only. …”
    Get full text
    Get full text
    Article
  17. 17

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…There have been various procedures suggested to date, whether through manual or automated selections, to choose the best model.This study nonetheless focuses on an automated selection for multiple equations model with the use of iterative estimation method. In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20