Search Results - (( software classification using algorithm ) OR ( evolution optimization bat algorithm ))

Refine Results
  1. 1

    Multi-Swarm bat algorithm by Taha A.M., Chen S.-D., Mustapha A.

    Published 2023
    “…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
    Article
  2. 2

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Software Classification Using Structure-Based Descriptors by Ramadan, Qusai Hussein

    Published 2009
    “…Based on the undertaken experiment, the IBK algorithm is noted to generate the highest classification accuracy (74.8%) compared to several other algorithms provided in the Weka tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Software defect prediction framework based on hybrid metaheuristic optimization methods by Wahono, Romi Satria

    Published 2015
    “…For the purpose of this study, ten classification algorithms have been selected. The selection aims at achieving a balance between established classification algorithms used in software defect prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8
  9. 9
  10. 10
  11. 11

    Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi

    Published 2014
    “…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Cross-project software defect prediction by Bala, Yahaya Zakariyau, Abdul Samat, Pathiah, Sharif, Khaironi Yatim, Manshor, Noridayu

    Published 2022
    “…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair... by Mohd Asri, Mohamad Khairan

    Published 2023
    “…This study aims to evaluate the effectiveness of open-source software algorithms for ground classification in lidar point clouds and the subsequent generation of accurate DTMs. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19
  20. 20

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
    Get full text
    Get full text
    Conference or Workshop Item