Search Results - (( variable visualisation _ algorithm ) OR ( java data selection algorithm ))

Refine Results
  1. 1

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…It assists design engineers as it gives a clearer visualization to predict which value of the variables gives a best produced result. This dissertation will demonstrate the ability of PSO Algorithm in improving design areas by the use of recommendation system that helps engineering designers to visualise an optimal design.…”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Then canonical Polyadic decomposition-based attribute reduction is applied to the offload-able task to reduce the data size. Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
    Get full text
    Get full text
    Article
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Thesis
  5. 5

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Reducing of Inconsistent Data using Fuzzy Multi Attribute Decision Making for Accessing Data from Database by Yusof, Mohd Kamir, Abdul Rahman, Mohd Nordin, Azlan, Atiqah

    Published 2013
    “…Sample data was selected for experiments purposes. The result indicates fuzzy multi attribute decision making is a suitable technique in reducing inconsistent data from database. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Predictors on outcomes of cardiovascular disease of male patients in Malaysia using Bayesian network analysis by Nurliyana Juhan, Yong Zulina Zubairi, Ahmad Syadi Mahmood Zuhdi, Zarina Mohd Khalid

    Published 2023
    “…Conclusions The data visualisation analysis can be a powerful tool to understand the relationships between the CVD prognostic variables and can be useful to clinicians.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Analysis of the dynamics of a vector-borne infection with the effect of imperfect vaccination from a fractional perspective by Tang T.-Q., Jan R., Khurshaid A., Shah Z., Vrinceanu N., Racheriu M.

    Published 2024
    “…To assess the impact of various parameters on the dynamics of chikungunya, we examine solution pathways using the Laplace-Adomian method of disintegration. Specifically, to visualise the impacts of fractional order, vaccination, bite rate and treatment computer algorithms are employed on the infection level of chikungunya. …”
    Article
  14. 14

    Axis manipulation to solve Inverse Kinematics of Hyper-Redundant Robot in 3D Space by Annisa, Jamali, Sheldon Ijau, Winston

    Published 2022
    “…Current methods for solving the inverse kinematics solution for a hyper-redundant robot in three 3D are generally complex, difficult to visualise, and time intensive. The condition requires development of new algorithms for solving inverse kinematics more quickly and efficiently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Bioinformatics analysis and spatiotemporal distribution of the f lic gene and its protein isolated from Escherichia coli-infected patients in Eastern Algeria by Harrar, Abdenassar, Awang Hamat, Rukman, Hamidechi, Mohamed Abdelhafid

    Published 2024
    “…The alignment results were then visualised using the MView programme. Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. …”
    Get full text
    Get full text
    Get full text
    Article