Search Results - (( java simulation optimization algorithm ) OR ( writer classification using algorithm ))

Refine Results
  1. 1

    Improved random forest for feature selection in writer identification by Sukor, Nooraziera Akmal

    Published 2015
    “…Important features are measured by using Variable Importance (VI). While Mean Absolute Error (MAE) values use to identify the variance between writers, VI value was used for splitting process in tree and MAE value is to ensure the intra-class (same writer) invariance is lower than inter-class (different writer) invariance because lower intra-class invariance indicates accuracy to the real author. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…The results disclose that the proposed discretized invariants reveal 99% accuracy of classification by using 3520 training data and 880 testing data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
    Get full text
    Get full text
    Book Chapter
  7. 7

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
    Get full text
    Get full text
    Book Chapter
  8. 8

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  9. 9

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis by Azmi, Mohd Sanusi, Muda, A. K.

    Published 2011
    “…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Azah Kamilah, Muda

    Published 2011
    “…Calligraphy classification of the ancient manuscripts gives useful information to paleographers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms by AbuSalim, S.W.G., Mostafa, S.A., Mustapha, A., Ibrahim, R., Wahab, M.H.A.

    Published 2023
    “…A blog is a platform where a writer or group of writers gives their opinion on a specific topic. …”
    Get full text
    Get full text
    Article
  15. 15

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis by Mohd Sanusi, Azmi, Muda, A. K., Khadijah Wan, Mohd Ghazali

    Published 2013
    “…The style of writing or calligraphy applied in ancient manuscripts gives useful information to paleographers. The information helps paleographer to identify date, writer, number of writers, place of origin, and the originality of manuscripts. …”
    Get full text
    Get full text
    Article
  17. 17

    Invariants discretization for individuality representation in handwritten authorship by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Mariyam, Darus, Maslina

    Published 2008
    “…Its focal point is in forensics and biometric application as such the writing style can be used as biometric features for authenticating a writer. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Beyond Sentiment Analysis: A Review of Recent Trends in Text Based Sentiment Analysis and Emotion Detection by Lai Po Hung, Suraya Alias

    Published 2023
    “…This is because emotions are the finer grained information which could be extracted from opinions. So besides writer sentiments, writer emotion is also a valuable data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20