Search Results - (( java application testing algorithm ) OR ( rule extraction factor algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- factor algorithm »
- rule extraction »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Framework development in extracting rules from trained neural network / Shuzlina Abdul Rahman, Azlinah Hj Mohamed and Marina Yusoff
Published 2006“…In addressing this framework, the criteria of each approaches has been explored and analyzed from eight factors: process extraction, merit, demerit, rule type, type of data, rule quality, processing complexity, and the description of each RE technique. …”
Get full text
Get full text
Research Reports -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…This study also demonstrated the practicality of the apriori algorithm in analyzing extensive datasets to extract actionable insights. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase
Published 2004“…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…In fuzzy reasoning method the weights are assigned to each proposition in the antecedent part and the Certainty Factor (CF) is computed for the consequent part of each Fuzzy Production Rule (FPR). …”
Get full text
Get full text
Thesis -
7
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…The domain expert has verified that the generated rules are able to explain the contributing factors towards failure analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Simultaneously, news sentiment analysis techniques were used to discover the polarity of news according to each factor. From news classification and news sentiment, a rule-based algorithm was used to predict the stock market turning points. …”
Get full text
Get full text
Book Section -
9
-
10
Refinement of generated weighted fuzzy production rules by using fuzzy neural networks for stock market prediction.
Published 2005“…The reasons for having these problems are 1) the WFPRs generated are not powerful enough to represent the domain knowledge, 2) the techniques used to generate WFPRs are pre- matured, ad-hoc or may not be suitable for the prediction problem, and 3) further refinement of the extracted rules has not been done. In this paper, we look into the solutions of the above problems by 1) enhancing the representation power of WFPRs by including local and global weights, 2) developing a fuzzy neural network (FNN) with enhanced learning algorithm, and 3) using this FNN to refine the local and global weights of WFPRs for stock market prediction. …”
Get full text
Get full text
Article -
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Integration of dual intelligent algorithms in shunt active power filter
Published 2013“…This paper presents an integration of dual intelligent algorithms: artificial neural network (ANN) based fundamental component extraction algorithm and fuzzy logic based DC-link voltage self-charging algorithm (fuzzy self-charging algorithm), in a three-phase three-wire shunt active power filter (SAPF). …”
Get full text
Get full text
Conference or Workshop Item -
13
GA optimization-based BRB AI reasoning algorithm for determining the factors affecting customer churn for operators
Published 2024“…Therefore, in this paper, a belief rule base (BRB) artificial intelligence inference algorithm based on GA optimization to determine the factors affecting customer churn for operators proposed. …”
Get full text
Get full text
Get full text
Article -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
15
Logic Mining Approach: Shoppers’ Purchasing Data Extraction via Evolutionary Algorithm
Published 2023“…In reducing the learning complexity, a genetic algorithm was implemented to optimize the logical rule throughout the learning phase in performing a 2-satisfiability-based reverse analysis method, implemented during the learning phase as this method was compared. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
