Search Results - (( java pattern classification algorithm ) OR ( using iterative case algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD by MOHAMED OSMAN, MOHAMED ABDELRAHIM

    Published 2017
    “…In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…The VS-MGS’s results ultimately revealed that the adaptation of elitism mechanism with iteration in greedy algorithm resulted in an improved efficiency in the process of generating a near-optimal test case set size.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Multi-objective service restoration in distribution networks using genetic algorithm by Moazami, Ehsan

    Published 2013
    “…Another proposed technique is implemented to improve the penalty strategy to enhance the performance of algorithm and reduce the convergence iteration. The effectiveness of the proposed method is demonstrated by testing on two case studies, a 33-bus test system and a 16 bus test system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. The Simplex algorithm has three stages of computation namely initialization, iterative calculation and termination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values by Ambrose, Jasmin

    Published 2000
    “…The developed IT was used for all cases of algorithm testing. It is speculated that better correlation values can be obtained if more loading test data are available during the course of this study.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…In this project, evolutionary prototype methodology was selected to smooth the software development according to the scopes and also the requirements. There are three iterations in this project. For the first iteration, use case diagrams and also the preliminary prototype had been developed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Modified Sumudu Transform Analytical Approximate Methods For Solving Boundary Value Problems by Al-Nemrat, Asem Mustafa Moh’ad

    Published 2019
    “…In this algorithm, the convolution theorem has been used to find an optimal Lagrange multiplier.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Modified Sumudu Transform Analytical Approximate Methods For Solving Boundary Value Problems by Al-Nemrat, Asem Mustafa Moh’ad

    Published 2019
    “…In this algorithm, the convolution theorem has been used to find an optimal Lagrange multiplier.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Identification of manipulator kinematics parameters through iterative method by Baharin, Iskandar, Hasan, Md. Mahmud

    “…A gradient projection algorithm was used to obtain the optimal parameters that had satisfied the world coordinates from the joint angles reading. …”
    Get full text
    Conference or Workshop Item
  14. 14

    Characterization of PV panel and global optimization of its model parameters using genetic algorithm by Ismail M.S., Moghavvemi M., Mahlia T.M.I.

    Published 2023
    “…The Manufacturer's Data Sheet information is used as a basis for the purpose of parameter optimization, with an average absolute error fitness function formulated; and a numerical iterative method used to solve the voltage-current relation of the PV module. …”
    Article
  15. 15

    Comparison of Some Numerical Methods for Solving Real-Life Nonlinear Equations by Using Python Programming / Annie Gorgey ... [et al.] by Gorgey, Annie, Zulkifly, Zul Hafiezy, Hassim, Haslinah, Azim, Farah Adilla

    Published 2024
    “…The study focuses on four types of iterative methods, such as Newton-Raphson, Bisection, Secant, and Algorithm 1, a novel fourth-order and derivative-free root-finding algorithm exhibiting different convergence orders. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…Apart from that, Iterative-based Sizing Algorithms (ISA) for each design case with the two sizing approaches were developed to determine the optimal solutions which were used as benchmark for FASA. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz by Abdul Aziz, Nur Izzati

    Published 2016
    “…Apart from that, Iterative-based Sizing Algorithms (ISA) for each design case with the two sizing approaches were developed to determine the optimal solutions which were used as benchmark for FASA. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar by Omar, Burhanuddin

    Published 1997
    “…An iterative mincut heunstic for partitioning networks is presented whose worst case computation time, per pass, grows linearly with the size of the network. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Solving 0/1 Knapsack Problem Using Hybrid HS and Jaya Algorithms by Alomoush, Alaa A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2018
    “…The new hybrid algorithm has been applied on different cases of Knapsack problem with different dimensions. 20 case studies have been evaluated by the new hybrid algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport by Toh , Yi Feng

    Published 2017
    “…The proposed methodology is inspired by the Delta Debugging algorithm which is has been used in automated software debugging but not in post-silicon hardware debugging. …”
    Get full text
    Get full text
    Thesis