Search Results - (( java implementation bat algorithm ) OR ( knowledge contribution patterns algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  3. 3

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  4. 4

    KopiCulture: Unveiling Customer Loyalty in Malaysia's Coffee Market through Clustering Algorithms for Local Cafe Insights by Tuan Norhafizah, Tuan Zakaria, Che Ku Nuraini, Che Ku Mohd

    Published 2024
    “…Using clustering algorithms such as KMeans, KMeans with Principal Component Analysis (PCA), single linkage, complete linkage, DBScan, and DBScan in conjunction with PCA, we identify distinct customer segments based on loyalty patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Machine Learning Applications in Offense Type and Incidence Prediction by Balaji, R., Manjula Sanjay, Koti, Harprith, Kaur

    Published 2024
    “…By applying this algorithm, the study achieves a high level of precision in predicting various types of detrimental behavior, enabling a better understanding of their underlying patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A spatial decision support system framework for optimization of cropping pattern and water resources allocation at pasargard plains, fars province, Iran by Ghasemi, Mohammad Mehdi

    Published 2014
    “…A unit response matrix groundwater model was coupled with a modified version of Genetic Algorithm (GA) in order to optimize cropping patterns and water allocation decisions. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Transitioning from information sharing to knowledge services: unpacking the evolution of rural media within the context of media integration by Wang, Shujie, Li, Ning, Liu, Niwen, Habes, Mohammed

    Published 2023
    “…The adaptability of TikTok’s content curation algorithms caters to diverse age groups, contributing significantly to user satisfaction. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…There are many complex factors that contribute to the incidence of dengue, for example, climatic condition, environmental factors, socioeconomic status, socio-demographic variables, human behaviour, and health belief pattern among others. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Ranking-based pruning and weighted support model for gene association in frequent itemsets / Sofianita Mutalib by Mutalib, Sofianita

    Published 2019
    “…Biological domain is one of the critical areas that always seek for useful knowledge and patterns observed through available methods, including data mining. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control by Mohd. Noor, Nurul Muthmainnah, Ahmad, Salmiah

    Published 2015
    “…Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Classification of stock market index based on predictive fuzzy decision tree by Khokhar, Arashid Hafeez

    Published 2005
    “…In particular, predictive FDT algorithm is based on the concept of degree of importance of attribute contributing to the classification. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A comparative study between rough and decision tree classifiers by Mohamad Mohsin, Mohamad Farhan

    Published 2008
    “…Theoretically, a good set of knowledge should provide good accuracy when dealing with new cases.Besides accuracy, a good rule set must also has a minimum number of rules and each rule should be short as possible.It is often that a rule set contains smaller quantity of rules but they usually have more conditions.An ideal model should be able to produces fewer, shorter rule and classify new data with good accuracy.Consequently, the quality and compact knowledge will contribute manager with a good decision model.Because of that, the search for appropriate data mining approach which can provide quality knowledge is important.Rough classifier (RC) and decision tree classifier (DTC) are categorized as RBC.The purpose of this study is to investigate the capability of RC and DTC in generating quality knowledge which leads to the good accuracy.To achieve that, both classifiers are compared based on four measurements that are accuracy of the classification, the number of rule, the length of rule, and the coverage of rule.Five dataset from UCI Machine Learning namely United States Congressional Voting Records, Credit Approval, Wisconsin Diagnostic Breast Cancer, Pima Indians Diabetes Database, and Vehicle Silhouettes are chosen as data experiment.All datasets were mined using RC toolkit namely ROSETTA while C4.5 algorithm in WEKA application was chosen as DTC rule generator.The experimental results indicated that both classifiers produced good classification result and had generated quality rule in different types of model – higher accuracy, fewer rule, shorter rule, and higher coverage.In term of accuracy, RC obtained higher accuracy in average while DTC significantly generated lower number of rule than RC.In term of rule length, RC produced compact and shorter rule than DTC and the length is not significantly different.Meanwhile, RC has better coverage than DTC.Final conclusion can be decided as follows “If the user interested at a variety of rule pattern with a good accuracy and the number of rule is not important, RC is the best solution whereas if the user looks for fewer nr, DTC might be the best choice”…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph