Search Results - (( java implication force algorithm ) OR ( pattern selection research algorithm ))

Refine Results
  1. 1
  2. 2

    Danger theory inspired artificial immune system for pattern recognition by Chung Seng Kheau, Rayner Alfred, Lau, Hui Keng, Jason Teo, Mohd. Hanafi Ahmad Hijazi, Nurul'alam Mohd. Yaakub

    Published 2007
    “…Based on ongoing initiatives in outlining OT algorithm, this research evaluates the performance of OT against NS algorithm within pattern recognition domain. …”
    Get full text
    Get full text
    Research Report
  3. 3

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Particle Swarm Optimisation (PSG) was selected as the base algorithm that needs improvement and integration with other techniques. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…The process of the SPAP Algorithm is to extend parameters of the Affine Projection Block with two different selections of windowing length that affect the final accuracy on pattern classification. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Sheet C1 Pattern Number Recognition Using Artificial Immune System Optimization by Yuniarti Denita, Sari, Tri Basuki, Kurniawan, Edi Surya, Negara, Tata, Sutabri

    Published 2022
    “…In order to recognize the numerical patterns on sheet C1, we, therefore, require a method that uses the Artificial Immune System (AIS), specifically the CSA (Clonal Selection Algorithm) algorithm, which is one of the AIS system's algorithms for optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail by Foo, Fong Yeng, Lau, Gee Choon, Ismail, Zuhaimy

    Published 2014
    “…The objective of this research is to estimate the Double Exponential Smoothing by using Genetic Algorithm Mechanism. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida by Nanyonga , Aziida

    Published 2019
    “…Prediction, identification, understanding and visualization of relationship between factors affecting mortality in ACS patients using feature selection and ML algorithms. Feature selection, classification and pattern recognition methods have been used in this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…Fourthly, adaptive search pattern selection takes into account various types of motion content by dynamically switching between stationary, center biased and, uniform search patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid by Mohd Zaid, Aishah Nabila

    Published 2024
    “…Literature review, knowledge acquisition, and dataset collection inform algorithm selection and dataset validation. The design and implementation phase focus on prototype development, while the evaluation phase assesses classification performance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Thesis
  15. 15
  16. 16

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Three types of March algorithms which are March 17N, March 12N and MarchPS 23N are selected to validate the tool in term of their compatibility for NPSF detection and diagnosis.Suitable data background is identified and a test procedure is developed for each algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks by F. M., Mohammed

    Published 2014
    “…Owing to a number of salient features which include the ability of learning incrementally and establishing nonlinear decision boundary with hyperboxes, the Fuzzy Min-Max (FMM) network is selected as the backbone for designing useful and usable pattern classification models in this research. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis