Search Results - (( using normalization based algorithm ) OR ( java classification using algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The study proposes the use of software metric thresholds in the classification process during the GA representation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Taguchi?s T-method with Normalization-Based Binary Bat Algorithm by Marlan Z.M., Jamaludin K.R., Harudin N.

    Published 2025
    “…Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
    Conference paper
  15. 15

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Towards the utilization of normalized LMS algorithm in adaptive filter by Misbah Emhammed, Misbah Abdelsalam, Ho, Yih Hwa

    Published 2014
    “…The analysis was mainly concentrated on the adapted algorithms’ performance. This study provides the insights necessary for considering other filtering mechanisms based on the normalized least mean square.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. …”
    Get full text
    Thesis