Search Results - (( java representation using algorithm ) OR ( basic adapting learning algorithm ))
Search alternatives:
- representation using »
- java representation »
- learning algorithm »
- adapting learning »
- using algorithm »
-
1
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
Get full text
Get full text
Thesis -
3
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…When the environment is changed the algorithm may fail to adapt itself to the new configuration. …”
Get full text
Get full text
Final Year Project -
4
Adaptive mechanism for enhanced performance of shark smell optimization / Nur Atharah Kamarzaman, Shahril Irwan Sulaiman and Intan Rahayu Ibrahim
Published 2021“…Numerical results indicate that the ASSO algorithm strategy outperforms the basic SSO algorithm, Genertic Algorithm (GA), Particle Swarm Intelligence (PSO), Firefly Algorithm (FA), Artificial Bee Colony (ABC) and Teaching Learning Based Optimization (TBLO) in term of reaching for global solution.…”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
Get full text
Get full text
Thesis -
8
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Guided by the explicit and implicit clustering constraints, sets of cohesive clusters are progressively derived to act as a high-level semantic representation of the software design. This research follows an empirical research methodology, where the proposed approach is validated using 40 object-oriented open-source software systems written in Java. …”
Get full text
Get full text
Thesis -
12
Campus study buddy : collaborative learning and resource sharing app
Published 2024“…The application is developed using Flutter and uses a tag recommendation algorithm to push content that users may be interested in, thereby intelligently providing users with an online learning environment that suits them and improving their learning efficiency. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
Get full text
Get full text
Thesis -
14
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…One of the prominent methods to improve machine learning accuracy is by using ensemble method which basically employs multiple base models. …”
Conference Paper -
15
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
16
-
17
A Novel Method for Fashion Clothing Image Classification Based on Deep Learning
Published 2023“…Furthermore, the study adopted the approximate dynamic learning rate update algorithm in the model training to realize the learning rate’s self-adaptation, ensure the model’s rapid convergence, and shorten the training time. …”
Get full text
Get full text
Get full text
Article -
18
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
19
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…These new route maintenance strategies are called as DIS- TANCE (DIstance baSed rouTe maintenANCE) and ADISTANCE (Adaptive DISTANCE). The algorithms work by adding another node (called bridge node) into the source list to prevent the link from failure. …”
Get full text
Get full text
Thesis -
20
Handover Parameter for Self-optimisation in 6g Mobile Networks: A Survey
Published 2024journal::journal article
