Search Results - (( structures detection mining algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  3. 3

    Dissimilarity algorithm on conceptual graphs to mine text outliers by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2009
    “…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Cancer Prediction Based On Data Mining Using Decision Tree Algorithm by Loh, Kin Ming

    Published 2022
    “…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In email spam detection, not only different parts and content of emails are important, but also the structural and special features of these emails have effective rule in dimensionality reduction and classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…At the end of this part will reviewed and studied about the mining algorithm the gathered from the research made earlier. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Image Classification for Age-related Macular Degeneration Screening Using Hierarchical Image Decompositions and Graph Mining by Mohd Hanafi Ahmad Hijazi, Chuntao Jiang, Frans Coenen, Yalin Zheng

    Published 2011
    “…The resulting decomposition is then stored in a tree structure to which a weighted frequent sub-tree mining algorithm is applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We employ conceptual graphs interchange format (CGIF) – a knowledge representation formalism to capture the structure and semantics of sentences. We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Examination timetabling using genetic algorithm case study: KUiTTHO by Mohd Salikon, Mohd Zaki

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Thesis