Search Results - (( using combination values algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- combination values »
- values algorithm »
- java application »
-
1
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
2
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…This involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combinations and 3124 as the secondary. …”
Get full text
Get full text
Thesis -
3
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…This involves the use of two combinations simultaneously such as the pair combination of prefix-suffix-prefix suffix-infix as primary combinations and prefix suffix-suffix-prefix-infix as the secondary. …”
Get full text
Get full text
Thesis -
4
Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour
Published 2022“…With a combination of Naive Bayes and k-NN algorithms, the accuracy value is increasing to 86%. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Controller placement mechanism in software defined network using k-median algorithm
Published 2016“…First, comparing to greedy algorithm that computes the combinations according to the order of the nodes and calculates the best values at each step, and the results were identical. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values
Published 2000“…The combined calibrated formulae (The Algorithm) were later tested using five static loading test results. …”
Get full text
Get full text
Thesis -
8
SVD-gorank: Recommender system algorithm using SVD and gower's ranking
Published 2025“…Recently, a ranking algorithm that combines user rating values from SVD (Singular Value Decomposition) and user similarity values has been proposed. …”
Get full text
Get full text
Get full text
Article -
9
Committee neural networks with fuzzy genetic algorithm.
Published 2011“…A bi-linear allocation lifetime approach is used to label the chromosomes based on their fitness value, which will then be used to characterize the diversity of the population. …”
Get full text
Get full text
Get full text
Article -
10
Extensions to the K-AMH algorithm for numerical clustering
Published 2018“…The original k-AMH algorithm for categorical values uses a simple matching dissimilarity measure, but for numerical values it uses Euclidean distance. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Enhanced Algorithms By Combining Gauss-Seidel And Newton-Raphson In Load Flow Analysis
Published 2017“…To overcome these concerns, we present enhanced algorithms for load flow analysis by combining Gauss-Seidel and Newton-Raphson methods that incorporate constant Jacobian to give a more dependable method with tolerable accuracy and shorter computation time.…”
Get full text
Get full text
Monograph -
13
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…In which it involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combination and 2341 as the secondary. …”
Get full text
Get full text
Thesis -
14
Sediment load forecasting from a biomimetic optimization perspective: Firefly and Artificial Bee Colony algorithms empowered neural network modeling in �oruh River
Published 2025“…The estimation of SL values was achieved using inputs of previous SL and streamflow values provided to the models. …”
Article -
15
A Study On Gene Selection And Classification Algorithms For Classification Of Microarray Gene Expression Data
Published 2005“…The Performance Of The Combined Techniques Is Validated By Using Leave-One-Out Cross Validation (Loocv) Technique And Receiver Operating Characteristic (Roc) Is Used To Analyze The Results. …”
Get full text
Get full text
Get full text
Article -
16
Robust combining methods in committee neural networks
Published 2011“…Our proposed approach is the Huber and Bisquare function to determine the error between measured and predicted value which is less influenced by outliers. Therefore, we have used a Genetic Algorithm (GA) method to combine the individuals with the Huber and Bisquare as the fitness functions. …”
Get full text
Get full text
Conference or Workshop Item -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
18
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…There are various decision tree algorithms, but the most commonly used are Iterative Dichotomiser 3 (ID3), CART, and C4.5. …”
Get full text
Get full text
Thesis -
20
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis
