Search Results - (( java implementation from algorithm ) OR ( using evolution machine algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optimization Of Fractional-Slot Permanent Magnet Synchronous Machine Using Analytical Sub-Domain Model And Differential Evolution by Mohamed, Mohd Rezal

    Published 2019
    “…Three multi-objective optimizations based on Analytical Sub-Domain (ASD) and Differential Evolution Algorithm (DEA), Analytical Sub-Domain (ASD) and Particle Swarm Optimization (PSO), Analytical Sub-Domain (ASD) and Genetic Algorithm (GA), for fractionalslot Permanent Magnet Synchronous Machines (PMSM) are formulated, computed and optimized. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Performance evaluation and benchmarking of an extended computational model of ant colony system for DNA sequence design by Zuwairie, Ibrahim, Mohd Falfazli, Mat Jusof, Mohd Zaidi, Mohd Tumari

    Published 2014
    “…The performance evolution however, was limited. In this study, the extended computational model of finite state machine is revisited and an extensive performance evolution s conducted using 5, 7, 10, 15, 20, 25, 30, 35, and 40 agents/ants, each with 100 independent runs. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…In comparison with V-Detectors, cuckoo search, differential evolution, support vector machine, artificial neural network, na¨ıve bayes, and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms other algorithms with an average detection rate of 95:30% on all the datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Ultra-short-term PV power forecasting based on a support vector machine with improved dragonfly algorithm by Kishore, D. J. Krishna, Mohamed, M. R., Sudhakar, K., Jewaliddin, S. K., Peddakapu, K., Srinivasarao, P.

    Published 2021
    “…The proposed model of support vector machine (SVM) with improved dragonfly algorithm(IDA) is used to forecast the PV power. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Short term forecasting based on hybrid least squares support vector machines by Zuriani, Mustaffa, M. H., Sulaiman, Ernawan, Ferda, Noorhuzaimi, Mohd Noor

    Published 2018
    “…In this study, hybrid Least Squares Support Vector Machines (LSSVM) with four meta-heuristic algorithms viz. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Literature Review of Optimization Techniques for Chatter Suppression In Machining by A. R., Yusoff, Mohamed Reza Zalani, Mohamed Suffian, Mohd Yusof, Taib

    Published 2011
    “…In this paper, it can be observed that for chatter suppression, optimization focuses on spindle design, tool path, cutting process, and variable pitch. Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Improved whale optimization algorithm for feature selection in Arabic sentiment analysis by Tubishat, Mohammad, Abushariah, Mohammad A.M., Idris, Norisma, Aljarah, Ibrahim

    Published 2019
    “…In addition, we also used Information Gain (IG) as a filter features selection technique with WOA using Support Vector Machine (SVM) classifier to reduce the search space explored by WOA. …”
    Get full text
    Get full text
    Article
  17. 17

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A New Co-Evolution Binary Particle Swarm Optimization With Multiple Inertia Weight Strategy For Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…The proposed method is validated with ten benchmark datasets from UCI machine learning repository. To examine the effectiveness of proposed method, four recent and popular feature selection methods namely BPSO, genetic algorithm (GA), binary gravitational search algorithm (BGSA) and competitive binary grey wolf optimizer (CBGWO) are used in a performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis