Search Results - (( using composition clustering algorithm ) OR ( basic selection method algorithm ))

Refine Results
  1. 1

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The classical benchmark problems and composite benchmark functions from Congress on Evolutionary Computation (CEC) 2005 special session is used for validate SDAA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…In addition, it improves classification metrics in comparison to basic feature selection methods.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…This thesis proposes methods that can overcome the problems of good behaviour selection and good behaviour deletion. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction by Abasi, Ammar Kamal Mousa

    Published 2021
    “…To achieve this aim: First, A new feature selection method for TDC, that is, binary multi-verse optimizer algorithm (BMVO) is proposed to eliminate irrelevantly, redundant features and obtain a new subset of more informative features. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…A systematic method for selecting the ANN's input variables was developed using Matlab Programming language.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…Artificial Bee Colony (ABC) algorithm is one of the methods used to solve the flowshop scheduling problem but only a few researches have been found using this method in this area. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models by Susanto, Tabita Yuni, Choiruddin, Achmad, Purnomo, Jerry Dwi Trijoyo

    Published 2023
    “…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Robust correlation feature selection based support vector machine approach for high dimensional datasets by Baba, Ishaq Abdullahi, Mohammed, Mohammed Bappah, Jillahi, Kamal Bakari, Umar, Aliyu, Hendi, Hasan Talib

    Published 2025
    “…Correlation-based feature selection methods are popular tools used to select the most important variables to include the true model in the analysis of sparse and high-dimensional models. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim by Ibrahim, Erman

    Published 2007
    “…Finally, the BP algorithm has been prove as a method that can be used for recognizing hand gesture for sign language and the successful task of recognition also dependent an the hnage processing. …”
    Get full text
    Thesis
  18. 18

    A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana by Aminath , Farshana

    Published 2018
    “…The performance of the proposed method was also evaluated by comparing the results with an existing benchmark method (greedy algorithm). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system by Ahmad Zainaddin, Dahlia Asyiqin, Mohd Hanapi, Zurina

    Published 2013
    “…In recent years, data mining approach for intrusion detection have been advised and used. The approach such as Genetic Algorithms , Support Vector Machines, Neural Networks as well as clustering has resulted in high accuracy and good detection rates but with moderate false alarm on novel attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20