Search Results - (( selective implementation some algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A Comparative Study Of Blockchain Algorithms For Non-Fungible Token by Woo, Jan Yin

    Published 2023
    “…In this research, there will be some selected algorithms, which is Proof-of-Work and Proof-of-Stakes from open resource and modified to the suitable testing criteria to evaluate valid and sufficient data for data visualization. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). Myers-Briggs Type Indicator is also used as a psychological assessment mechanism in the selection process to enhance the accuracy of the proposed technique. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimization of k-Nearest Neighbour to categorize Indonesian’s news articles by Ihsan, Afdhalul, Rainarli, Ednawati

    Published 2021
    “…The way to solve this problem is to conduct the feature selection process. There are several filter-based feature selection methods; some are Chi-Square, Information Gain, Genetic Algorithm, and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…By removing these irrelevant and redundant features accuracy of the learning algorithms can be increased. In this paper implementation of different feature selection techniques have been reviewed. …”
    Get full text
    Get full text
    Article
  8. 8

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SEGMENTATION OF ANTI-NUCLEAR ANTIBODY IMAGES BASED ON WATERSHEDS AND FAST REGION MERGING by Mehfar, Noor Liyana

    Published 2013
    “…Moreover, in this paper, basic Gaussian filter is been implement to enhance the watershed segmentation by reducing some of the unwanted noise inside the images and highlighting the edge of cells. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Computational Technique for an Efficient Classification of Protein Sequences With Distance-Based Sequence Encoding Algorithm by Iqbal, M.J., Faye, I., Said, A.M.D., Samir, B.B.

    Published 2017
    “…A statistical metric-based feature selection algorithm is then adopted to identify the reduced set of features to represent the original feature space. …”
    Get full text
    Get full text
    Article
  11. 11

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…Pre-processing resolves the issue of missing data and hence normalizes the data.Outlier treatment employs k-mean clustering to validate the class.Suitable components were selected through comparison of classifier algorithms and feature selection.Attribute weighting based feature selection was selected for assigning weightage.Weighted risk factor was used on training dataset in order to improve accuracy and computation time of the prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A novel N-input voting algorithm for X-by-wire fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ramli, Abdul Rahman

    Published 2014
    “…Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Designing an algorithm for bioloid humanoid navigating in its indoor environment by Akhtaruzzaman, Md., Shafie, Amir Akramin, Muhammad , Mahbubur Rashid

    Published 2012
    “…As the navigation map is predetermined, the designed algorithm animates the humanoid to navigate by selecting an optimal route, depending on some external commands, to reach at the goal position. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Formulation of invariants for discrete orthogonal moments and image classification / Pee Chih Yang by Pee, Chih Yang

    Published 2013
    “…Discrete Tchebichef moments are selected as the implementation platform of the proposed algorithms.To evaluate the performance of invariant algorithms, empirical studies have been carried out on large set of binary images which consist of numbers, English letters, symbols, Chinese characters and objects like animals, trees and company logos under noiseless and noisy conditions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  18. 18

    MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data by Hongwu, Qin, Ma, Xiuqin, Herawan, Tutut, Jasni, Mohamad Zain

    Published 2014
    “…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. MGR implements clustering from the attributes viewpoint which includes selecting a clustering attribute using mean gain ratio and selecting an equivalence class on the clustering attribute using entropy of clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…K-means clustering is applied to select the highly promising company; MGWO is implemented for feature selection and training; finally, MGWO-NN is applied to predict the stock price. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis