Search Results - (( java implication tree algorithm ) OR ( based constructing ((a algorithm) OR (_ algorithm)) ))
Search alternatives:
- based constructing »
- java implication »
- implication tree »
- tree algorithm »
- a algorithm »
-
1
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
2
Ant system-based feature set partitioning algorithm for classifier ensemble construction
Published 2016“…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
Get full text
Get full text
Get full text
Article -
3
Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization
Published 2023“…This paper introduces a new variant of the metaheuristic algorithm based on the naked mole rat (NMR) algorithm, called the Q-learning naked mole rat algorithm (QL-NMR), for substitution box construction and optimization. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization
Published 2023“…This paper introduces a new variant of a recent metaheuristic algorithm based on the Social Network Search algorithm (SNS), which is called the Roulette Wheel Social Network Search algorithm (SNS). …”
Get full text
Get full text
Get full text
Get full text
Article -
5
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
6
-
7
A data mining approach to construct graduates employability model in Malaysia
Published 2011“…The performance of Bayes algorithms are also compared against a number of tree-based algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Optimization of structural design for sustainable construction of transmission tower based on topographical algorithm
Published 2023“…Optimization of transmission tower structures is traditionally based on either optimization of members sizes with fixed topographical shape or based on structural analysis modelling strategies without taking cognizance of fabrication and constructability issue facing the contractors . …”
Conference paper -
9
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
10
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
11
An elitist-flower pollination-based strategy for constructing sequence and sequence-less t-way test suite
Published 2018“…In line with such a need, this paper presents a unified strategy based on the new meta-heuristic algorithm, called the elitist flower pollination algorithm (eFPA), for sequence and sequence-less coverage. …”
Get full text
Get full text
Get full text
Article -
12
An evolutionary based features construction methods for data summarization approach
Published 2015“…In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
Get full text
Get full text
Research Report -
13
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…(iii) It is a constructive-based meta-heuristic algorithm which means, the solution is incrementally constructed (step by step) until the complete solution is obtained (Noferesti and Shah-Hosseini, 2012). …”
thesis::doctoral thesis -
14
Harmony annealing algorithm for curriculum-based course timetabling problem
Published 2012“…An attempt to solve these problems was made via an approach broken down into two parts; first, constructive algorithm with saturation degree approach was used to ensure a feasible solution, where the hard constraints are satisfied.Secondly, Harmony annealing algorithm was used to further improve the results obtained.The algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A Pairwise Test Suite Generator based on Melody Search Algorithm
Published 2016“…This paper aims to introduce MS as a pairwise testing strategy called a Pairwise Test suite generator based Melody Search Algorithm (PTMS). …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…The optimized DBN algorithm, known as the HW-DBN algorithm, integrated through feature learning based on a Gaussian–Bernoulli Restricted Boltzmann Machine as well as classification task through a weight neuron network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…In this research, emphasis is given on increasing the complexity of a block cipher algorithm. We propose a new dynamic determinant block cipher (DDBC) designed based on the determinant matrix properties which shall meet the security requirements of a secure block cipher. …”
Get full text
Get full text
Thesis -
18
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
19
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The procedure developed in this work use polynomials and cubic splines to construct the approximation function. The output of the algorithm is a set of extreme points that can be used to construct a minimal error approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The procedure developed in this work use polynomials and cubic splines to construct the approximation function. The output of the algorithm is a set of extreme points that can be used to construct a minimal error approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis
