Search Results - (( using function method algorithm ) OR ( software classification issues algorithm ))

Refine Results
  1. 1

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…Several approaches and benchmark data were used to validate the effectiveness of the proposed method compared to the unimodal system and normal feature selection method. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Filter-wrapper based feature ranking technique for dynamic software quality attributes by Kamaruddin, Siti Sakira, Yahaya, Jamaiah, Deraman, Aziz, Ahmad, Ruzita

    Published 2012
    “…The existing ranking techniques do not address the issue of redundancy in ranking the software quality attributes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) SRS have been collected as our case study and text mining technique is used to classify the ambiguity and unambiguity requirements. Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…This thesis proposes a classification model to detect water leakage, focusing on finding water leakage’s location and size, using K-Nearest Neighbour (K-NN) classification method. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.

    Published 2023
    “…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
    Article
  20. 20

    Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.

    Published 2023
    “…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
    Article