Search Results - (( java implementation bees algorithm ) OR ( knowledge creating using algorithm ))
Search alternatives:
- java implementation »
- implementation bees »
- knowledge creating »
- using algorithm »
- bees algorithm »
- creating using »
-
1
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
3
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…In the past, the growth of human knowledge was slow and limited. For instance, when an innovation was created in the 18th century in the UK, it took several months or even years for the news to reach other parts of the globe. …”
Get full text
Get full text
Get full text
Thesis -
4
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009“…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
7
Developing an intelligent system to acquire meeting knowledge in problem-based learning environments
Published 2006“…Similarly, the algorithm proposed in MALESAbrain can, be used to deal, the problem of conducting a meeting among learners to solve problems. …”
Get full text
Get full text
Get full text
Article -
8
Cryptanalysis in cryptographic algorithm design
Published 2006“…Therefore, a cryptographic algorithm has to endure cryptanalysis to ensure that it is safe for private or public use. …”
Get full text
Conference or Workshop Item -
9
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…In the Requirement Analysis we managed to create the use case diagram and the system specification. …”
Get full text
Get full text
Thesis -
10
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
Get full text
Get full text
Thesis -
11
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
12
-
13
-
14
Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini
Published 2023“…For the recognized sign language gesture, the algorithm creates a bounding box with a label. The hand signs are then translated into words, allowing medical staff to clearly understand the conversation. …”
Get full text
Get full text
Thesis -
15
Investigations On Human Perceptual Maps Using A Stereo-Vision Mobile Robot
Published 2018“…The outcomes indicate that the proposed computer vision techniques and computational mapping algorithms for human perceptual map building are robust and useful. …”
Get full text
Get full text
Thesis -
16
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
17
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
18
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…Once the model was developed, the calculations to determine the optimum maintenance schedule were done using the dynamic programming formulation created for this maintenance scheduling problem. …”
Get full text
Get full text
Thesis -
19
Rough sets for predicting the Kuala Lumpur Stock Exchange Composite Index returns
Published 2004“…There are extensive literatures available describing attempts to use artificial intelligence techniques; in particular neural networks and genetic algorithm for analyzing stock market variations.However, drawbacks are found where neural networks have great complexity in interpreting the results; genetic algorithms create large data redundancies.A relatively new approach, the rough sets are suggested for its simple knowledge representation, ability to deal with uncertainties and lowering data redundancies.In this study, a few different discretization algorithms were used at data preprocessing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
An automated strabismus classification using machine learning algorithm for binocular vision management system
Published 2023“…This shows that using the case-based reasoning algorithm can give better performance in classifying the class.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
