Search Results - (( java application during algorithm ) OR ( variable interactions means algorithm ))
Search alternatives:
- variable interactions »
- application during »
- interactions means »
- java application »
- during algorithm »
- means algorithm »
-
1
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
Get full text
Get full text
Get full text
Book Chapter -
2
The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction
Published 2023“…This, however, leads to sub-optimality of prediction accuracy as the orthogonal array design lacks in offering higher-order variable interactions, in addition to its fixed and limited variable combinations to be assessed and evaluated. …”
Article -
3
Development of an effective clustering algorithm for older fallers
Published 2022“…The proposed algorithm was developed through the stages of: data pre-processing, feature identification and extraction with either t-Distributed Stochastic Neighbour Embedding (t-SNE) or principal component analysis (PCA)), clustering (K-means clustering, Hierarchical clustering, and Fuzzy C-means clustering) and characteristics interpretation with statistical analysis. …”
Get full text
Get full text
Article -
4
Development Of Fall Risk Clustering Algorithm In Older People
Published 2020“…A total of 1279 subjects and 9 variables from dataset (1411 subjects and 139 variables) are selected for clustering. t-Distributed Stochastic Neighbour Embedding (t-SNE) for feature extraction and K-means clustering algorithm achieved the highest performance in clustering, which grouping the subjects into Low (13%), Intermediate A (19%), Intermediate B (21%) and High (31%) fall risk group. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Development of genetic algorithm for optimization of yield models in oil palm production
Published 2018“…Moreover, models were built on the basis of variables that have been selected by the GA. Across the optimization, procedures obtained the best Two Factor Interaction (2FI) models to achieve the best model of oil palm productivity prediction with a value of R2 of 0.948, mean squared error of 0.022, and the model P-value of < 0.0001 in Sabah. …”
Get full text
Get full text
Get full text
Article -
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
How social media crisis response and social interaction is helping people recover from Covid-19: an empirical investigation
Published 2022“…Furthermore, the IPMA was applied to evaluate the model’s usefulness, which compares the level of the variables from the performance scale mean value against the importance level. …”
Get full text
Get full text
Article -
8
Data driven neuroendocrine pid controller for mimo plants based adaptive safe experimentation dynamics algorithm
Published 2020“…Therefore, this study proposed the adaptive safe experimentation dynamics (ASED) algorithm to improve the SED algorithm performance accuracy by minimizing its objective function in terms of mean, best, worst, and standard deviation analysis. …”
Get full text
Get full text
Thesis -
9
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…Moreover, various indicators were implemented to evaluate the ANN model’s productivity including relative root mean square error (RRMSE), mean square error (MSE), root mean square error (RMSE), mean absolute percentage error (MAPE) and relative error (RE). …”
Get full text
Get full text
Get full text
Thesis -
10
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
-
13
-
14
Enhanced Taguchi�s T-method using angle modulated Bat algorithm for prediction
Published 2023“…This is due to the fixed and limited combination offered for evaluation as well as the lack of higher-order interaction of combination. In response to this issue, this paper proposed an angle modulated Bat algorithm to be integrated with the T-method in optimizing the prediction model. …”
Article -
15
-
16
All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.]
Published 2014“…An ADR was considered preventable if it was avoidable by any means currently available unless that means was not considered standard care. …”
Get full text
Get full text
Get full text
Book Section -
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
18
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Hand gesture recognition technology has gained significant attention in recent years due to its potential to revolutionize human-computer interaction by offering a natural and intuitive means of communication. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
A centralised multi-objective model predictive control for biventricular assist devices / Vivian Koh Ci Ai
Published 2020“…Firstly, a simple state-space model of the CVS-BiVAD system was required prior to the development of an MPC algorithm. For this purpose, a complex CVS-BiVAD model was simplified by reducing the number of state variables. …”
Get full text
Get full text
Get full text
Thesis
