Search Results - (( a constructive method algorithm ) OR ( using factor method algorithm ))
Search alternatives:
- method algorithm »
- a constructive »
- using factor »
-
1
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Then, 40 safety and health specialists were involved in carrying out a risk assessment using the existing method of risk analysis (RA) and the new proposed method of RASH. …”
Get full text
Get full text
Thesis -
2
An evolutionary based features construction methods for data summarization approach
Published 2015“…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
Get full text
Get full text
Research Report -
3
Generalized Triad Design Algorithms
Published 2012“…Additionally, a new technique for STD(v) algorithms, known as the “Generalized Interval Method - GIM” was constructed, by analyzing the pattern of the triples in the STD(v) using the intervals number and the components of triples. …”
Get full text
Get full text
Thesis -
4
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
5
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…As the requirement of the Ant System Algorithm, the problem is modeled as a graph that can be used by the ant to deliver its pheromone. …”
Get full text
Get full text
Get full text
Thesis -
6
Parallel visualization approach of a 3D heart model
Published 2008“…The main target of this paper is to find an optimum strategy for the construction of the RF map and a decent estimation algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
8
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…PSO is a swarm-based search algorithm perform a stochastic search to explore the search space. …”
Get full text
Get full text
Thesis -
9
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks
Published 2020“…A new weighted least squares method was embedded to solve nonlinear equation problem. …”
Get full text
Get full text
Get full text
Article -
11
Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam
Published 2015“…The method used is the collection of data using Wi-Fi fingerprint Apps on smartphone. …”
Get full text
Get full text
Thesis -
12
Using unique-prime-factorization theorem to mine frequent patterns without generating tree
Published 2011“…However, for a large database, constructing a large tree in the memory is a time consuming task and increase the time of execution. …”
Get full text
Get full text
Get full text
Article -
13
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
Get full text
Get full text
Article -
14
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
15
A Stepper Motor Design Optimization Using
Published 2005“…In this project, the design optimization of a stepper motor is presented. In general, the area of study can be divided into motor principles and construction, design methods, and digital control experiments. …”
Get full text
Get full text
Monograph -
16
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
Get full text
Get full text
Get full text
Article -
17
-
18
A Model Development And Comparison Study On The Microwave Remote Sensing Of Snow Medium Using A Coupled Finite Element Method And Method Of Moment, And The Relaxed Hierarchical Equ...
Published 2022“…Computational Electromagnetics Method (CEM) is vital to construct a more detailed shape of the scatterers and offer a better knowledge of the interaction between microwave radiation and the medium by considering the coherent effect of the dense snow medium. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
20
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
Get full text
Get full text
Thesis
