Search Results - (( ((using processing) OR (pre processing)) tasks algorithm ) OR ( java application a algorithm ))

Refine Results
  1. 1

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  2. 2

    Pre-processing of input features using LPC and warping process by Sudirman, Rubita, Sh-Hussain, Salleh, Ming, Ting Chee

    Published 2005
    “…Another task is to align the input frames (test set) to the reference template (training set) using a modified DTW algorithm called DTW fixing frame (DTW-FF)algorithm. …”
    Get full text
    Get full text
    Article
  3. 3

    JTAGGER by YAACOB, NORHANA

    Published 2006
    “…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An intelligent categorization tool for malay research articles by Mohd Norhisham Razali, Rayner Alfred, Chin, Kim On

    Published 2015
    “…These pre-processing processes include stemming, part-of-speech tagging and named-entity recognition. …”
    Get full text
    Get full text
    Research Report
  6. 6
  7. 7

    DTWFF-pitch feature and faster neural network convergence for speech recognition by Sudirman, Rubita, Salleh, Sh. Hussain, Salleh, Shaharuddin

    Published 2007
    “…The first task is to extract pitch features using Pitch Scale Harmonic Filter algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A New And Fast Rival Genetic Algorithm For Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2021
    “…Feature selection is one of the significant steps in classification tasks. It is a pre-processing step to select a small subset of significant features that can contribute the most to the classification process. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…For contextual text classification, the pre-trained LLM is further train on classificationspecific labeled data in a process called fine-tuning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin by Ahmad, Khairul Azman, Mohd Noor, Mohd Halim, Mohamad Idin, Mohamad Adha

    Published 2011
    “…Pre¬processing consists of a collection of simple image processing tasks that change the raw input video into a format that can be processed by subsequent steps. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Inverse problem in image processing: Image restoration by Wong, Yen Khai

    Published 2023
    “…The proposed MB-ES algorithm utilizes intermediate restored images to identify the optimal stopping point using PSNR and SSIM metrics, thus eliminating the need for pre-defined early stopping. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Time normalization of LPC feature using warping method by Sudirman, Rubita, Salleh, Sh. Hussain, Khalid, Puspa Inayat, Ahmad, Abd. Hamid

    Published 2005
    “…The first task is to extract pitch features using Pitch Scale Harmonic Filter (PSHF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…The knowledge acquired by the process is interpreted and mapped into vectors, which are kept in the database and used by the system to guide its reasoning process. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…The image data is pre-processed; the CNN algorithm is then applied to classify the ASD and non-ASD, and the steps of implementing the CNN algorithm are clearly stated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Implementation Of Hardware Software Partitioning In Embedded System by Mohd Nor, Masyirah

    Published 2018
    “…The parameter setting is used for both algorithms is 15 number of task/node, 500 maximum number of iteration, 100 no of particles/population size and the pre-defined hardware and software area and execution time for each task as the input of the algorithms. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Furthermore, it enables non-dominated evaluation of solutions based on four objectives using crowding distance for selection. The proposed algorithm with its variable length solution encoding enables moving the cloudlets among pre-defined locations, adding or removing them in order to increase the quality of service according to the change in the user density caused by user mobility. …”
    Get full text
    Get full text
    Thesis