Search Results - (( java implementation bat algorithm ) OR ( causing problems tree algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    A matrix approach for minimum spanning tree in neutrosophic and application in medical waste management / Nur Haifa Ahmad Hayazim, Siti Nurain Zulkifli and Siti Nurhidayah Yaacob by Ahmad Hayazim, Nur Haifa, Zulkifli, Siti Nurain, Yaacob, Siti Nurhidayah

    Published 2022
    “…The problem of finding the minimum spanning tree (MST) is one of the most extensively studied and significant combinatorial optimization problems in graph theory. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…This problem can cause the imbalance in sales. Based on the problem statement, Genetic Algorithm was applied to test whether it is compatible to predict the future sales. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient terrain coverage for deploying wireless sensor nodes on multi-robot system by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2016
    “…One of solution for this problem is using mobile robots with concern on exploration algorithm for mobile robot. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…Developing an exploration algorithm based on spanning tree is the main contribution. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…In addition, exponential growth of data causes high computational costs in Apriori-like algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    The effectiveness of bottom up technique with probabilistic approach for a Malay parser by Muhammad Azhar Fairuzz Hiloh, Mohd Juzaiddin Ab Aziz, Lailatul Qadri Zakaria

    Published 2018
    “…This task is performed by a parser which will produce a parse tree as output. However, a problem occurs when the parsing process produces two or more parse trees in which the parser unable to represent a precise parse tree. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees by Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina

    Published 2014
    “…In this paper, a new scheme based on multiple key trees is proposed. Instead of using only a single key tree multiple key trees are used and at the end of each batch time the algorithm decides which tree will be used to update the keys. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Household overspending model amongst B40, M40 and T20 using classification algorithm by Zulaiha Ali, Othman, Azuraliza, Abu Bakar, Nor Samsiah, Sani, Jamaludin, Sallim

    Published 2020
    “…The results show that the decision tree through J48 algorithm has produced the easiest rule to be interpreted. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms by Qayyum, Abdul, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Iqbal, Mahboob, Abdullah, Mohd Faris, Rasheed, Waqas, Tuan Abdullah, Tuan Ab Rashid, Ramli, A Q

    Published 2015
    “…Monitoring vegetation encroachment under overhead high voltage power line is a challenging problem for electricity distribution companies. Absence of proper monitoring could result in damage to the power lines and consequently cause blackout. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks by Mantoro, Teddy, Shaukat Ali, Haroon, Ayu, Media Anugerah, Usino, Wendi

    Published 2011
    “…Both ways will try to reduce the famous bottleneck problem that cause wireless sensor nodes energy nearest to base station depleted very quickly. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    3D surface reconstruction of coronary arteries from cardiovascular angiography to detect location of heart vessels by Khaleel, Hasan Hadi

    Published 2012
    “…We proposed an algorithm to extract tree vessels from cardiovascular angiography by removing the background and highlighting the coronary artery tree vessels. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Hybridization Of Optimized Support Vector Machine And Artificial Neural Network For The Diabetic Retinopathy Classification Problem by Kader, Nur Izzati Ab

    Published 2019
    “…Due to the success of many classification problems been proposed with good result, k-Nearest Neighbour, Artificial Neural Network, and Support Vector Machine algorithms are used in this research.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  20. 20