Search Results - (( java data optimization algorithm ) OR ( construct validation toward algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  3. 3

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    EasyA: Easy and effective way to generate pairwise test data by Rabbi, Khandakar Fazley, Sabira, Khatun, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2013
    “…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…Rijndael (AES) is a well-known block cipher algorithm with proven robustness towards countless cryptographic attacks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Polytechnic science lecturers’ intention to use ICT as a tool in northeast Nigeria: a smart PLS approach by Yohanna, G., Md Yunos, Jailani, Mohamad, Marlina, Ruth, J. Y.

    Published 2017
    “…Several studies affirmed a significant influence of perception of usefulness and perception on ease-of-use on attitude towards technology acceptance and were validated in different behavioural intention to use. …”
    Get full text
    Get full text
    Article
  13. 13

    Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization by Khosropanah, Pegah, Ramli, Abdul Rahman, Lim, Kheng Seang, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…Fusion of MEMD and sLORETA results in approximately zero localization error in terms of spatial difference with the validated MRI reference. High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
    Get full text
    Get full text
    Article
  14. 14

    Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization by Khosropanah, Pegah, Ramli, Abdul Rahman, Lim, Kheng Seang, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…Fusion of MEMD and sLORETA results in approximately zero localization error in terms of spatial difference with the validated MRI reference. High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms by Nurellezia, Suleiman

    Published 2023
    “…The classifiers are validated and evaluated using accuracy, precision, recall, and f1-score along with 10-folds cross validation. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. In order to support fine-grained diagnostic analysis and optimize the performance level of the networks, the reconstruction of per-packet routing path is essential. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…The efforts are concerted towards self-assembly mechanism of heterogeneous DNA shapes, construction of multiple configurations that can form the identical endstructures, exploration of a less stringent sequence design and predicting connectivity map for the DNA nanostructures assembly. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Variable Speed Control Of Two-Mass Wind Turbine System Via State Feedback With Adaptation Law by Mohamad Murad, Nor Syaza Farhana

    Published 2018
    “…Wind turbine convert kinetic energy from the wind to rotational energy and then to electrical energy.In a wind energy conversion system (WECS),its electrical power control (EPC) side demanded a maximum mechanical power from the mechanical power control (MPC) side despite any intermittent wind and seasonal interference.Therefore,it is necessary to develop a variable speed algorithm for a modern WECS.For a two-mass horizontal axis wind turbine, the rotor and generator stiffness is commonly being neglected in the system dynamic.The inclusion of stiffness in system dynamic introduces integral term in the system expression and hence,incur mathematical complexity in the controller design phase.Contrary,this study consider stiffness as unknown parameter in the wind turbine dynamic.In order to obtain the maximum output power,the design of an algorithm with adaptation law for the speed control of a two-mass wind turbine system with an unknown stiffness is proposed in this research.The algorithm is formulated using a full-state feedback.In pursuance of solving the tracking control as a regulation case,the speed of the turbine is bijective mapped into the error dynamic.The stability of the proposed algorithm is guaranteed by Lyapunov.The adaptation law used in the variable speed algorithm is to successfully acquire the adaptability of the algorithm towards an unknown stiffness.Therein,the estimated stiffness is augmented in the Lyapunov function.The Lie derivative of the function is made into a negative semi-definite via the non-negative control parameters.In order to control the rotor speed to sustain the optimum tip-speed ratio (TSR),as well as obtaining the maximum power output from the turbine,the proposed algorithm is constructed.A MATLAB with Simulink® toolbox is used to validate the effectiveness of the proposed control speed.The simulation result showed that the rotor speed achieved an asymptotic tracking towards the demanded rotor speed irrespective of the stiffness value.The error is proved to be minimized as the integral of absolute error (IAE) obtained for wind turbine with stiffness ranging from 134550 Nmrad-1,269100 Nmrad-1,and 403650 Nmrad-1 are recorded as 0.003088,0.003063 and 0.003088 respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis