Search Results - (( outlier optimization method algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm by Dalatu, Paul Inuwa

    Published 2018
    “…The K-Means algorithm is the commonest and fast technique in partitional cluster algorithms, although with unnormalized datasets it can achieve local optimal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic database of robust neural network forecasting / Saadi Ahmad Kamaruddin, Nor Azura Md. Ghani and Norazan Mohamed Ramli by Ahmad Kamaruddin, Saadi, Md. Ghani, Nor Azura, Mohamed Ramli, Norazan

    Published 2014
    “…However, this algorithm is not always so robust in the presence of outliers, and this may ruin the entire neural network fit. …”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7
  8. 8

    Robust techniques for linear regression with multicollinearity and outliers by Mohammed, Mohammed Abdulhussein

    Published 2016
    “…The ordinary least squares (OLS) method is the most commonly used method in multiple linear regression model due to its optimal properties and ease of computation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…In general, genetic based clustering algorithms showed the ability to reach near global optimal solution. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of robust procedures for partial least square regression with application to near infrared spectral data by Silalahi, Divo Dharma

    Published 2021
    “…The results indicate that the proposed method outperforms the existing methods in this study. …”
    Get full text
    Get full text
    Thesis
  11. 11

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…However, LS methods suffers from oversmoothing properties (such as in curve fitting) and high sensitivity to outliers as error squaring significantly increases in magnitude. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…To address these challenges, this research introduces a novel Depth Linear Discrimination-Oriented Feature Selection Method based on Adaptive Sine Cosine Algorithm, named Depth Adaptive Sine Cosine Feature Selection (DASC-FS). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An optimized ensemble for predicting reservoir rock properties in petroleum industry by Kenari, Seyed Ali Jafari

    Published 2013
    “…The first method isbased on fuzzy genetic algorithm to overcome the premature convergence. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Diamond price prediction using random forest algorithm / Nur Amirah Mohd Azmi by Mohd Azmi, Nur Amirah

    Published 2025
    “…Diamonds are priced based on various attributes such as carat, cut, color, clarity, depth, and table, which exhibit complex interrelationships. Traditional methods struggle to model these complexities effectively, necessitating adoption of advanced algorithms to improve accuracy. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis