Search Results - (( variable 2 based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…Based on the findings, Algorithm 2 outperforms Algorithm 1 in classifying the minority group, while both proposed algorithms perform equally well in classifying the majority group. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    FPGA implementation of variable precision Euclid’s GCD algorithm by Al-Haija, Qasem Abu, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Alfarran, Islam

    Published 2017
    “…Methodology: In this paper, we implement a fast GCD coprocessor based on Euclid's method with variable precisions (32-bit to 1024-bit). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Power plant energy predictions based on thermal factors using ridge and support vector regressor algorithms by Afzal, Asif, Alshahrani, Saad, Alrobaian, Abdulrahman, Buradi, Abdulrajak, Khan, Sher Afghan

    Published 2021
    “…Initially, the Ridge algorithm-based modeling is performed in detail, and then SVR-based LR, named as SVR (LR), SVR-based radial basis function—SVR (RBF), and SVR-based polynomial regression—SVR (Poly.) algorithms, are applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…In dealing with correlated variables, PCA was embedded in the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy by Rahman, Sam Matiur, Ali, Md. Asraf, Altwijri, Omar, Alqahtani, Mahdi, Ahmed, Nasim, Ahamed, Nizam Uddin

    Published 2020
    “…In addition, the ranked order of the variables based on their importance differed across the ML algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…The performance is measured by the percentages of SURE-Autometrics algorithm that are able to eliminate the irrelevant variables from the initial GUMS of two, four and six equations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article