Search Results - (( java data optimization algorithm ) OR ( data competency _ algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  3. 3

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    EasyA: Easy and effective way to generate pairwise test data by Rabbi, Khandakar Fazley, Sabira, Khatun, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2013
    “…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…There are several stages in developing a KMS, namely compiling data requirements for the four lecturer competencies: pedagogical competency, professional competency, personality competency, and social competency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Academic leadership bio-inspired classification model using negative selection algorithm by Jantan, Hamidah, Sa’dan, Siti ‘Aisyah, Che Azemi, Nur Hamizah Syafiqah

    Published 2015
    “…In the experimental phase, academic leadership competency data were collected from a selected higher learning institution as training data-set based on 10-fold cross validation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Statistical process control for failure crushing time data using competing risks model. by Elfaki, F.A.M., Daud, Isa, Ibrahim, Noor Akma, Daud, J., Azram, M., Usman, M.

    Published 2011
    “…This paper describes a Statistical Process Control (SPC) for failure crushing time data using competing risks model. The model is based on the widely known proportional hazard regression model for a variety of censoring. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Statistical process control for failure crushing time data using competing risks model by Elfaki, Faiz Ahmed Mohamed, Daoud, Jamal Ibrahim, Azram, Mohammad, Daud, Isa, Ibrahim, N.A., Usman, Mustofa

    Published 2011
    “…This paper describes a Statistical Process Control (SPC) for failure crushing time data using competing risks model. The model is based on the widely known proportional hazard regression model for a variety of censoring. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A near-optimal centroids initialization in K-means algorithm using bees algorithm by Mahmuddin, Massudi, Yusof, Yuhanis

    Published 2009
    “…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Competing risks for reliability analysis using Cox’s model by Mohamed Elfaki, Faiz Ahmed, Daud, Isa, Ibrahim, Nor Azowa, Abdullah, M. Y., Usman, Mustofa

    Published 2007
    “…Originality/value – A modification of the two competing risk models has mostly been applied in failure time data and simulation data. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Cutpoint determination methods in competing risks subdistribution model by Noor Akma Ibrahim, Abdul Kudus, Isa Daud, Mohd. Rizam Abu Bakar

    Published 2009
    “…Thus, we consider the problem of obtaining a threshold value of a continuous covariate given a competing risk survival time response using a binary partitioning algorithm as a way to optimally partition data into two disjoint sets. …”
    Get full text
    Get full text
    Article
  19. 19

    Cutpoint determination methods in competing risks subdistribution model by Ibrahim, Noor Akma, Kudus, Abdul, Daud, Isa, Abu Bakar, Mohd Rizam

    Published 2009
    “…Thus, we consider the problem of obtaining a threshold value of a continuous covariate given a competing risk survival time response using a binary partitioning algorithm as a way to optimally partition data into two disjoint sets. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis