Search Results - (( programme a optimisation algorithm ) OR ( java automatic classification algorithm ))
Search alternatives:
- automatic classification »
- optimisation algorithm »
- a optimisation »
- programme a »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
Get full text
Get full text
Thesis -
2
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…This work aims to optimise the tool path by simulating the removal of material in a finite element environment, which is controlled by a Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
3
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…This work was carried out with the aim to optimise the tool path by simulating the removal of material in a finite element environment which is controlled by a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Article -
6
Malaysia residential load profile management based on time of use tariff using ant colony optimization algorithm
Published 2022“…For those reasons, the government has introduced Demand Side Management (DSM) as a programme to promote balanced energy use between energy generation and demand. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Investigating the performance of metaheuristics to optimise the revenue of the semiconductor supply chain is the final year project that focuses on to identify the supply chain shortage problem related to semiconductors and to compare among the 20 metaheuristics algorithm optimization programmes capable of optimising the semiconductor supply chain. …”
Get full text
Get full text
Monograph -
8
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…Its performances in term of Peak Signal-to-Noise (PSNR), compression ratio and coding gain is proved to be best approximation to the DCT algorithm. In this work, the design and implementation of 8 x 8 block 2-D forward BinDCT algorithm on a Field Programmable Gate Array (FPGA) is presented. …”
Get full text
Get full text
Thesis -
9
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…After that, the algorithm proceeds to Group Allocation Stage in a round robin optimisation. …”
Get full text
Get full text
Get full text
Thesis -
10
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Using genetic algorithms to optimise land use suitability
Published 2012Get full text
Get full text
Thesis -
13
Primary care provider’s barriers to effective management of apparently resistant hypertension in Malaysian public primary health care and strategies to overcome them: a qualitative...
Published 2026“…Theme 4: Strategies to overcome barriers (Subthemes: engaging family members and caregivers, simplifying out-of-office BP monitoring, optimising clinic appointment scheduling and virtual consultations, establishing multidisciplinary team-based care, professional capacity building, standardising referral algorithms, enhancing patient education materials and programmes, strengthening continuity of care, and improving access to FDC antihypertensive medications). …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Implementation of luo-rudi phase 1 cardiac cell excitation model in FPGA
Published 2017“…A fixedpoint optimisation has been successfully obtained with Percentage Error (PE) and Mean Square Error (MSE) which are -1.08% and 2.28%, respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
-
17
Prediction accuracy improvement for Bitcoin market prices based on symmetric volatility information using artificial neural network approach
Published 2020“…The optimal model employs a multilayer neural network (NN) along with an “optimised operator” with the ability to locate the optimal factor loading of the applied algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…Results obtained also reveal a signi�cant achievement in terms of the architecture e�ciency and applications performance.…”
Get full text
Get full text
Thesis
