Search Results - (( java implementation using algorithm ) OR ( missing problem using (algorithmic OR algorithms) ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
- missing problem »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An Evaluation of Machine Learning Algorithms for Missing Values Imputation
Published 2019“…It represents the research and imputation of missing values in gene expression data. By using the local or global correlation of the data we focus mostly on the contrast of the algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Missing-values imputation algorithms for microarray gene expression data
Published 2019“…Numerous bioinformatics examination tools are used for cancer prediction, including the data set matrix (Bailey et al., Cell 173(2):371–385, 2018); thus, it is necessary to resolve the problem of missing-values imputation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
5
Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset
Published 2020“…This problem inspires the idea to develop a prediction algorithm to predict the missing values in the dataset, where Support vector regression (SVR) has been proposed as a prediction method to predict missing values in several academic types of researches. …”
Get full text
Get full text
Article -
6
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Missing values lead to the difficulty of extracting useful information from that data set. …”
Get full text
Get full text
Thesis -
7
Development of an imputation technique - INI for software metric database with incomplete data
Published 2007“…Missing data causes significant problem. With inaccurate data or missing data, it is very difficult to know how much a project will cost or worth. …”
Get full text
Get full text
Get full text
Book Section -
8
Missing value estimation methods for data in linear functional relationship model
Published 2017“…Missing value problem is common when analysing quantitative data. …”
Get full text
Get full text
Get full text
Article -
9
Enhanced utility accrual scheduling algorithms for adaptive real time system.
Published 2009“…These algorithms addressed the unnecessary abortion problem that was identified in the existing algorithm known as General Utility Scheduling (GUS). …”
Get full text
Article -
10
Multi-Objectives Memetic Discrete Differential Evolution Algorithm for Solving the Container Pre-Marshalling Problem
Published 2019“…In addition, it improves the exploration and exploitation capabilities of the algorithm. The standard pre-marshalling benchmark dataset (i.e., Bortfeldt-Forster) is used to evaluate the effectiveness of the proposed algorithm. …”
Get full text
Get full text
Article -
11
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This best algorithm consists of greedy prefetching and prefetch array algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Hybrid Sine Cosine and Fitness Dependent Optimizer for global optimization
Published 2021“…Additionally, the SC-FDO was applied to the missing data estimation cases and refined the missingness as optimization problems. …”
Get full text
Get full text
Get full text
Article -
13
Discovering optimal clusters using firefly algorithm
Published 2016Get full text
Get full text
Article -
14
Continuous collision detection for virtual environments: A walkthrough of techniques
Published 2011“…While DCD requires backtracking after collision has been detected, CCD does not suffer the same problems as DCD. CCD also avoids the tunnelling problem that exists in DCD algorithms where penetration always occurs to the object (missed the collision). …”
Get full text
Get full text
Get full text
Article -
15
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In the proposed method, high-rank attributes are selected and then preparators are applied to the selected traits. A compensation algorithm is implemented to reduce the problem of missing and distorted sort keys. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
17
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…In the final part of the study on the missing value problem in LFRM, the modern imputation techniques, namely the expectation-maximization (EM) algorithm and the expectation-maximization with bootstrapping (EMB) algorithm is proposed. …”
Get full text
Get full text
Get full text
Thesis -
18
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
19
-
20
A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem
Published 2009“…In this study, we propose an Optimised Crossover Genetic Algorithm (OCGA) for the problem. The objective is to find a schedule which minimises the maximum lateness of the jobs in the presence of the sequence independent family setup times.In brief, the proposed OCGA uses binary representation to encode the problem. …”
Get full text
Conference or Workshop Item
