Search Results - (( using function method algorithm ) OR ( software classification issues algorithm ))
Search alternatives:
- software classification »
- classification issues »
- method algorithm »
- issues algorithm »
- function method »
- using function »
-
1
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…In this paper, the filter method chi square and the Artificial Bee Colony) ABC algorithm were both used as FS methods . …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
Get full text
Get full text
Get full text
Article -
3
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…Several approaches and benchmark data were used to validate the effectiveness of the proposed method compared to the unimodal system and normal feature selection method. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Mussels wandering optimization algorithmn based training of artificial neural networks for pattern classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
-
10
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
Get full text
Get full text
Thesis -
12
Filter-wrapper based feature ranking technique for dynamic software quality attributes
Published 2012“…The existing ranking techniques do not address the issue of redundancy in ranking the software quality attributes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) SRS have been collected as our case study and text mining technique is used to classify the ambiguity and unambiguity requirements. Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
15
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…This thesis proposes a classification model to detect water leakage, focusing on finding water leakage’s location and size, using K-Nearest Neighbour (K-NN) classification method. …”
Get full text
Get full text
Thesis -
17
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
18
A framework for malware identification based on behavior
Published 2012Get full text
Get full text
Thesis -
19
Implementation of lightweight cryptographic primitives
Published 2023“…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
Article -
20
Implementation of lightweight cryptographic primitives
Published 2023“…In this paper we present a comprehensive survey of all lightweight symmetric cryptographic primitives, from hardware and software perspectives. The survey covers analysis of these algorithms and a comparison between these primitives in terms of throughput, number of cycle, comprehensive area, power, and energy. …”
Article
