Search Results - (( a constructive method algorithm ) OR ( using factor method algorithm ))

Refine Results
  1. 1

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Then, 40 safety and health specialists were involved in carrying out a risk assessment using the existing method of risk analysis (RA) and the new proposed method of RASH. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
    Get full text
    Get full text
    Research Report
  3. 3

    Generalized Triad Design Algorithms by Saa, Tareq Mohammad Abu

    Published 2012
    “…Additionally, a new technique for STD(v) algorithms, known as the “Generalized Interval Method - GIM” was constructed, by analyzing the pattern of the triples in the STD(v) using the intervals number and the components of triples. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…As the requirement of the Ant System Algorithm, the problem is modeled as a graph that can be used by the ant to deliver its pheromone. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel visualization approach of a 3D heart model by Malekpour, A., Ling, T.C., Lim, W.C.

    Published 2008
    “…The main target of this paper is to find an optimum strategy for the construction of the RF map and a decent estimation algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…PSO is a swarm-based search algorithm perform a stochastic search to explore the search space. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…The method used is the collection of data using Wi-Fi fingerprint Apps on smartphone. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Using unique-prime-factorization theorem to mine frequent patterns without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2011
    “…However, for a large database, constructing a large tree in the memory is a time consuming task and increase the time of execution. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
    Get full text
    Get full text
    Article
  14. 14

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
    Get full text
    Get full text
    Article
  15. 15

    A Stepper Motor Design Optimization Using by Wong, Chin Wei

    Published 2005
    “…In this project, the design optimization of a stepper motor is presented. In general, the area of study can be divided into motor principles and construction, design methods, and digital control experiments. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A Model Development And Comparison Study On The Microwave Remote Sensing Of Snow Medium Using A Coupled Finite Element Method And Method Of Moment, And The Relaxed Hierarchical Equ... by Hamsalekha, Kumaresan

    Published 2022
    “…Computational Electromagnetics Method (CEM) is vital to construct a more detailed shape of the scatterers and offer a better knowledge of the interaction between microwave radiation and the medium by considering the coherent effect of the dense snow medium. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  20. 20

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
    Get full text
    Get full text
    Thesis