Search Results - (( variable negative selection algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…In this research, the Real-Valued Negative Selection with fixed-sized detectors (RNSA) and Real-Valued Negative Selection with variable-sized detectors (V-Detector) were applied for classification and detection of anomalies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Mixed-variable ant colony optimisation algorithm for feature subset selection and tuning support vector machine parameter by Alwan, Hiba Basim, Ku-Mahamud, Ku Ruhana

    Published 2017
    “…ACOMV-SVM algorithm is able to simultaneously tune SVM parameters and feature subset selection. …”
    Get full text
    Get full text
    Article
  4. 4

    Hybrid ACO and SVM algorithm for pattern classification by Alwan, Hiba Basim

    Published 2013
    “…The first two algorithms, ACOR-SVM and IACOR-SVM, tune the SVM parameters while the second two algorithms, ACOMV-R-SVM and IACOMV-R-SVM, tune the SVM parameters and select the feature subset simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Since the emergence of AIS, it has proved itself as an area of computational intelligence. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development Of Fall Risk Clustering Algorithm In Older People by Wong, Kam Kang

    Published 2020
    “…A total of 1279 subjects and 9 variables from dataset (1411 subjects and 139 variables) are selected for clustering. t-Distributed Stochastic Neighbour Embedding (t-SNE) for feature extraction and K-means clustering algorithm achieved the highest performance in clustering, which grouping the subjects into Low (13%), Intermediate A (19%), Intermediate B (21%) and High (31%) fall risk group. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Predicting crop yield and field energy output for oil palm using genetic algorithm and neural network models by Hilal, Yousif Yakoub

    Published 2019
    “…Finally, this research concluded that a genetic algorithm is useful for selecting input variables in oil palm production. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Advanced fault detection in DC microgrid system using reinforcement learning by Min, Keng Tan, Kar, Leong Lee, Kit, Guan Lim, Ahmad Razani Haron, Pungut Ibrahim, Tze, Kenneth Kin Teo

    Published 2021
    “…The results showed that the improved Negative Selection Algorithm with variable sized detector has better performance than the general Negative Selection Algorithm with constant sized radius in detecting fault in DC microgrid system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  12. 12

    Modelling and investigating the impacts of climatic variables on ozone concentration in Malaysia using correlation analysis with random forest, decision tree regression, linear reg... by Balogun, A.-L., Tella, A.

    Published 2022
    “…The four machine learning algorithms exhibit high predictive performances, generally ascertaining the predictive accuracy of the climatic variables. …”
    Get full text
    Get full text
    Article
  13. 13

    Modelling and investigating the impacts of climatic variables on ozone concentration in Malaysia using correlation analysis with random forest, decision tree regression, linear reg... by Balogun, A.-L., Tella, A.

    Published 2022
    “…The four machine learning algorithms exhibit high predictive performances, generally ascertaining the predictive accuracy of the climatic variables. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Thus, the BBNs represent the dependencies in the variables better than assuming independence of all the variables. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…This study used purposive sampling for sample selection. Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman by Othman, Nor Azairiah Fatimah

    Published 2017
    “…The influence of the variables selected for this study was tested on two distinct samples of Lower Semester Group, LSG (semester 1- 3) and Higher Semester Group, HSG (semester 4-6) separately… The assessment and improvement of angle stability condition of the power system using particle swarm optimization (PSO) technique / Nor Azwan Mohamed Kamari This thesis presents the assessment and improvement of stability domains for the angle stability condition of the power system using particle swarm optimization (PSO) technique. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…However, the performance of these algorithms in situations with closely comparable risk magnitudes remains uncertain. …”
    Get full text
    Get full text
    Get full text
    Thesis