Search Results - (( java application during algorithm ) OR ( variable interactions means algorithm ))

Refine Results
  1. 1

    Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation by Kamal Z., Zamli, Ahmed, Bestoun S., Mahmoud, Thair, Afzal, Wasif

    Published 2018
    “…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction by Marlan Z.M., Ramlie F., Jamaludin K.R., Harudin N.

    Published 2023
    “…This, however, leads to sub-optimality of prediction accuracy as the orthogonal array design lacks in offering higher-order variable interactions, in addition to its fixed and limited variable combinations to be assessed and evaluated. …”
    Article
  3. 3

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The proposed algorithm was developed through the stages of: data pre-processing, feature identification and extraction with either t-Distributed Stochastic Neighbour Embedding (t-SNE) or principal component analysis (PCA)), clustering (K-means clustering, Hierarchical clustering, and Fuzzy C-means clustering) and characteristics interpretation with statistical analysis. …”
    Get full text
    Get full text
    Article
  4. 4

    Development Of Fall Risk Clustering Algorithm In Older People by Wong, Kam Kang

    Published 2020
    “…A total of 1279 subjects and 9 variables from dataset (1411 subjects and 139 variables) are selected for clustering. t-Distributed Stochastic Neighbour Embedding (t-SNE) for feature extraction and K-means clustering algorithm achieved the highest performance in clustering, which grouping the subjects into Low (13%), Intermediate A (19%), Intermediate B (21%) and High (31%) fall risk group. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Development of genetic algorithm for optimization of yield models in oil palm production by Hilal, Yousif Y., Wan Ismail, Wan Ishak, Yahya, Azmi, Ash’aari, Zulfa Hanan

    Published 2018
    “…Moreover, models were built on the basis of variables that have been selected by the GA. Across the optimization, procedures obtained the best Two Factor Interaction (2FI) models to achieve the best model of oil palm productivity prediction with a value of R2 of 0.948, mean squared error of 0.022, and the model P-value of < 0.0001 in Sabah. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    How social media crisis response and social interaction is helping people recover from Covid-19: an empirical investigation by Bukar, Umar Ali, A. Jabar, Marzanah, Sidi, Fatimah, Nor, R. N. H., Abdullah, Salfarina, Ishak, Iskandar

    Published 2022
    “…Furthermore, the IPMA was applied to evaluate the model’s usefulness, which compares the level of the variables from the performance scale mean value against the importance level. …”
    Get full text
    Get full text
    Article
  8. 8

    Data driven neuroendocrine pid controller for mimo plants based adaptive safe experimentation dynamics algorithm by Mohd Riduwan, Ghazali

    Published 2020
    “…Therefore, this study proposed the adaptive safe experimentation dynamics (ASED) algorithm to improve the SED algorithm performance accuracy by minimizing its objective function in terms of mean, best, worst, and standard deviation analysis. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh by Seef Saadi , Fiyadh

    Published 2019
    “…Moreover, various indicators were implemented to evaluate the ANN model’s productivity including relative root mean square error (RRMSE), mean square error (MSE), root mean square error (RMSE), mean absolute percentage error (MAPE) and relative error (RE). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12
  13. 13
  14. 14

    Enhanced Taguchi�s T-method using angle modulated Bat algorithm for prediction by Marlan Z.M., Ramlie F., Jamaludin K.R., Harudin N.

    Published 2023
    “…This is due to the fixed and limited combination offered for evaluation as well as the lack of higher-order interaction of combination. In response to this issue, this paper proposed an angle modulated Bat algorithm to be integrated with the T-method in optimizing the prediction model. …”
    Article
  15. 15
  16. 16

    All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.] by Chiau Ming, Long, Karuppannan, Mahmathi, Abdul Wahab, Izyan, Abd Wahab, Mohd Shahezwan, Zulkifly, Hanis Hanum

    Published 2014
    “…An ADR was considered preventable if it was avoidable by any means currently available unless that means was not considered standard care. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…Hand gesture recognition technology has gained significant attention in recent years due to its potential to revolutionize human-computer interaction by offering a natural and intuitive means of communication. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    A centralised multi-objective model predictive control for biventricular assist devices / Vivian Koh Ci Ai by Vivian Koh , Ci Ai

    Published 2020
    “…Firstly, a simple state-space model of the CVS-BiVAD system was required prior to the development of an MPC algorithm. For this purpose, a complex CVS-BiVAD model was simplified by reducing the number of state variables. …”
    Get full text
    Get full text
    Get full text
    Thesis