Search Results - (( programme _ optimisation algorithm ) OR ( java data classification algorithm ))
Search alternatives:
- optimisation algorithm »
- data classification »
- programme »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Major problems in classification task are large amount of training data, large number of features and different behavior of data streams that reduce accuracy and increase computational cost in classifier training phase. …”
Get full text
Get full text
Thesis -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
6
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…This work aims to optimise the tool path by simulating the removal of material in a finite element environment, which is controlled by a Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…This work was carried out with the aim to optimise the tool path by simulating the removal of material in a finite element environment which is controlled by a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Article -
9
-
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Malaysia residential load profile management based on time of use tariff using ant colony optimization algorithm
Published 2022“…To determine the LPM this study made use of optimisation algorithms such as Ant Colony Optimisation (ACO); and an analysis comparing the performance of different load shift weightages that reduce the total cost of electricity are also considered and presented. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
Get full text
Get full text
Monograph -
13
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024Conference Paper -
14
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Investigating the performance of metaheuristics to optimise the revenue of the semiconductor supply chain is the final year project that focuses on to identify the supply chain shortage problem related to semiconductors and to compare among the 20 metaheuristics algorithm optimization programmes capable of optimising the semiconductor supply chain. …”
Get full text
Get full text
Monograph -
16
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…Its performances in term of Peak Signal-to-Noise (PSNR), compression ratio and coding gain is proved to be best approximation to the DCT algorithm. In this work, the design and implementation of 8 x 8 block 2-D forward BinDCT algorithm on a Field Programmable Gate Array (FPGA) is presented. …”
Get full text
Get full text
Thesis -
17
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…After that, the algorithm proceeds to Group Allocation Stage in a round robin optimisation. …”
Get full text
Get full text
Get full text
Thesis -
18
Using genetic algorithms to optimise land use suitability
Published 2012Get full text
Get full text
Thesis -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article
