Search Results - (( using combination values algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat by Mat, Suriani

    Published 2001
    “…This involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combinations and 3124 as the secondary. …”
    Get full text
    Get full text
    Thesis
  3. 3

    To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail by Ismail, Norasiah

    Published 2001
    “…This involves the use of two combinations simultaneously such as the pair combination of prefix-suffix-prefix suffix-infix as primary combinations and prefix suffix-suffix-prefix-infix as the secondary. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Controller placement mechanism in software defined network using k-median algorithm by Fahad, Noor Saad

    Published 2016
    “…First, comparing to greedy algorithm that computes the combinations according to the order of the nodes and calculates the best values at each step, and the results were identical. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values by Ambrose, Jasmin

    Published 2000
    “…The combined calibrated formulae (The Algorithm) were later tested using five static loading test results. …”
    Get full text
    Get full text
    Thesis
  8. 8

    SVD-gorank: Recommender system algorithm using SVD and gower's ranking by Saifudin, Ilham, Widiyaningtyas, Triyanna, Zaeni, Ilham Ari Elbaith, Aminuddin, Afrig

    Published 2025
    “…Recently, a ranking algorithm that combines user rating values from SVD (Singular Value Decomposition) and user similarity values has been proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Committee neural networks with fuzzy genetic algorithm. by Jafari , S.A., Mashohor , Syamsiah, Varnamkhasti, M. Jalali

    Published 2011
    “…A bi-linear allocation lifetime approach is used to label the chromosomes based on their fitness value, which will then be used to characterize the diversity of the population. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Extensions to the K-AMH algorithm for numerical clustering by Seman, Ali, Mohd Sapawi, Azizian

    Published 2018
    “…The original k-AMH algorithm for categorical values uses a simple matching dissimilarity measure, but for numerical values it uses Euclidean distance. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhanced Algorithms By Combining Gauss-Seidel And Newton-Raphson In Load Flow Analysis by Abouhasera, Mohamed Khalid Mohamed

    Published 2017
    “…To overcome these concerns, we present enhanced algorithms for load flow analysis by combining Gauss-Seidel and Newton-Raphson methods that incorporate constant Jacobian to give a more dependable method with tolerable accuracy and shorter computation time.…”
    Get full text
    Get full text
    Monograph
  13. 13

    To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi by Mohd Supandi, Mohd Nazril Hafez

    Published 2000
    “…In which it involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combination and 2341 as the secondary. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sediment load forecasting from a biomimetic optimization perspective: Firefly and Artificial Bee Colony algorithms empowered neural network modeling in �oruh River by Katipo?lu O.M., Kartal V., Pande C.B.

    Published 2025
    “…The estimation of SL values was achieved using inputs of previous SL and streamflow values provided to the models. …”
    Article
  15. 15

    A Study On Gene Selection And Classification Algorithms For Classification Of Microarray Gene Expression Data by Yeo, Lee Chin, Deris, Safaai

    Published 2005
    “…The Performance Of The Combined Techniques Is Validated By Using Leave-One-Out Cross Validation (Loocv) Technique And Receiver Operating Characteristic (Roc) Is Used To Analyze The Results. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Robust combining methods in committee neural networks by Kenari, Seyed Ali Jafari, Mashohor, Syamsiah

    Published 2011
    “…Our proposed approach is the Huber and Bisquare function to determine the error between measured and predicted value which is less influenced by outliers. Therefore, we have used a Genetic Algorithm (GA) method to combine the individuals with the Huber and Bisquare as the fitness functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd by Nur Farahaina, Idris

    Published 2022
    “…There are various decision tree algorithms, but the most commonly used are Iterative Dichotomiser 3 (ID3), CART, and C4.5. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
    Get full text
    Get full text
    Thesis