Search Results - (( using function method algorithm ) OR ( based information data algorithm ))

Refine Results
  1. 1

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case) by Lytvyn, Oleg M., Nechuiviter, Olesia, Pershyna, Iuliia, Mezhuyev, Vitaliy

    Published 2019
    “…Current stage of research in astronomy, radiology, computed tomography, holography, and radar is characterized by broad use of digital technologies, algorithms, and methods. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    A partition based feature selection approach for mixed data clustering / Ashish Dutt by Ashish , Dutt

    Published 2020
    “…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm by Khor, Lay Hoong

    Published 2006
    “…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
    Get full text
    Get full text
    Monograph
  11. 11

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Bayesian inference for the bivariate extreme model by Mohd Amin, Nor Azrita, Adam, Mohd Bakri

    Published 2016
    “…Maximum likelihood method and a Markov chain Monte Carlo (MCMC) technique, Multiple-try Metropolis algorithm are implemented into the data analysis. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Evaluation of Search Result of Document Search Based GA (DSEGA) by Kamal Norfarid, Kamaruddin

    Published 2004
    “…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Computational Technique for an Efficient Classification of Protein Sequences With Distance-Based Sequence Encoding Algorithm by Iqbal, M.J., Faye, I., Said, A.M.D., Samir, B.B.

    Published 2017
    “…The accurate classification of protein sequence would be helpful in determining the structure and function of novel protein sequences. In this article, we have proposed a distance-based sequence encoding algorithm that captures the sequence's statistical characteristics along with amino acids sequence order information. …”
    Get full text
    Get full text
    Article
  17. 17

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. The method of discovering the distance relay decision algorithm essentially involved formulating rough set discernibility matrix and function from relay event report, finding reducts of pertinent attributes using genetic algorithm and finally generating relay prediction rules. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Arabic text classification using hybrid feature selection method using chi-square binary artificial bee colony algorithm by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2021
    “…After that, the wrapper method, Artificial Bee Colony algorithm, is used as the second level where Naive Base is used as a fitness function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20