Search Results - (( programmes _ optimisation algorithm ) OR ( java automatic classification algorithm ))
Search alternatives:
- automatic classification »
- optimisation algorithm »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
Get full text
Get full text
Thesis -
2
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
4
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…This work aims to optimise the tool path by simulating the removal of material in a finite element environment, which is controlled by a Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
5
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…This work was carried out with the aim to optimise the tool path by simulating the removal of material in a finite element environment which is controlled by a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Article -
6
Malaysia residential load profile management based on time of use tariff using ant colony optimization algorithm
Published 2022“…To determine the LPM this study made use of optimisation algorithms such as Ant Colony Optimisation (ACO); and an analysis comparing the performance of different load shift weightages that reduce the total cost of electricity are also considered and presented. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Investigating the performance of metaheuristics to optimise the revenue of the semiconductor supply chain is the final year project that focuses on to identify the supply chain shortage problem related to semiconductors and to compare among the 20 metaheuristics algorithm optimization programmes capable of optimising the semiconductor supply chain. …”
Get full text
Get full text
Monograph -
8
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…Its performances in term of Peak Signal-to-Noise (PSNR), compression ratio and coding gain is proved to be best approximation to the DCT algorithm. In this work, the design and implementation of 8 x 8 block 2-D forward BinDCT algorithm on a Field Programmable Gate Array (FPGA) is presented. …”
Get full text
Get full text
Thesis -
9
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…After that, the algorithm proceeds to Group Allocation Stage in a round robin optimisation. …”
Get full text
Get full text
Get full text
Thesis -
10
Using genetic algorithms to optimise land use suitability
Published 2012Get full text
Get full text
Thesis -
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Primary care provider’s barriers to effective management of apparently resistant hypertension in Malaysian public primary health care and strategies to overcome them: a qualitative...
Published 2026“…Theme 4: Strategies to overcome barriers (Subthemes: engaging family members and caregivers, simplifying out-of-office BP monitoring, optimising clinic appointment scheduling and virtual consultations, establishing multidisciplinary team-based care, professional capacity building, standardising referral algorithms, enhancing patient education materials and programmes, strengthening continuity of care, and improving access to FDC antihypertensive medications). …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Implementation of luo-rudi phase 1 cardiac cell excitation model in FPGA
Published 2017“…By implementing the constructed algorithm into the high performance FPGA system, a new real-time simulation-based analysis technique of cardiac electrical excitation has been successfully developed.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Three-dimensional structure of Human Epididymis Protein 4 (HE4): a protein modelling of an ovarian cancer biomarker through in silico approach
Published 2024“…PROCHECK and ERRAT programmes were employed to assess the structure quality. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Prediction accuracy improvement for Bitcoin market prices based on symmetric volatility information using artificial neural network approach
Published 2020“…The study uses Rapid-Miner programme based on artificial neural network (ANN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…Despite their advantages, most 3-D medical imaging algorithms are computationally intensive with matrix transformation as the most fundamental operation involved in the transform-based methods. …”
Get full text
Get full text
Thesis
