Search Results - (( using function based algorithm ) OR ( binary classification means algorithm ))

Refine Results
  1. 1

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…Previously, there is limited work on the clustering and classification of biologically active compounds into their activity based classes using fuzzy and neural network. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Mohd Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2021
    “…Consequently, optimization algorithms including binary gravitation search algorithm (BGSA) and binary particle swarm optimization (BPSO), were employed to identify the optimal channels for gender classification. …”
    Get full text
    Get full text
    Article
  4. 4

    A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation by Hujainah, Fadhl Mohammed Omar

    Published 2019
    “…Furthermore, the proposed SRPTackle is based on the combination of the proposed StakeQP technique, the constructed requirement priority value formulation function and the employing of classifying algorithm (K-means and K-means++) and binary search tree. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting by Ali, Noor Rasidah, Ku Mahamud, Ku Ruhana

    Published 2017
    “…Therefore, a clustering algorithm by introducing data transformation using X-means data splitting is proposed to investigate the spatial homogeneity of time series rainfall data. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Classification of Cognitive Frailty in Elderly People from Blood Samples using Machine Learning by Idris, S., Badruddin, N.

    Published 2021
    “…A total of 7 different classification algorithms were used to predict between 6 levels of CF, the Robust and Non-Robust groups, as well as the Robust and Frail with MCI groups. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Segmentation Assisted Object Distinction For Direct Volume Rendering by Irani, Arash Azim Zadeh

    Published 2013
    “…A set of image processing techniques are creatively employed in the design of K-means based hybrid segmentation algorithm.…”
    Get full text
    Get full text
    Thesis
  8. 8

    The identification of oreochromis niloticus feeding behaviour through the integration of photoelectric sensor and logistic regression classifier by Mohamad Radzi, Mohd Sojak, Mohd Azraai, Mohd Razman, Anwar, P. P. Abdul Majeed, Rabiu Muazu, Musa, Ahmad Shahrizan, Abdul Ghani, Ismed, Iskandar

    Published 2018
    “…The signals acquired from the sensors are converted into binary data. The hunger behaviour classes are determined through k-means clustering algorithm, i.e., satiated and unsatiated. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Enhanced extreme learning machine for general regression and classification tasks by Mahmood, Saif F

    Published 2020
    “…The method is developed for regression task by using mean/ median of ELM training errors which is then used as threshold for separating the training data and converting the continuous targets to binary. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing by Ramadhan, Rakhmat Sani

    Published 2014
    “…This research concerns on binary classification which is classified into two classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An Optimized Semantic Segmentation Framework for Human Skin Detection by Huong, Audrey, Ngu, Xavier

    Published 2024
    “…The model produced satisfactory performances even with a strict split of 50 %, confirming the high efficiency of the proposed framework. The mean Jaccard index and Dice similarity measures evaluated between the annotated and predicted mask ranged from 0.80 to 0.93 in the binary classification of pixels as “skin” versus “background”. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa by Md Isa, Amalina Izzati

    Published 2018
    “…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article