Search Results - (( based constitutional system algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- constitutional system »
- based constitutional »
- implication based »
- system algorithm »
- java implication »
-
1
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…Therefore, it is difficult for the users to find all the inter-related acts from the federal constitutional using manual method. In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of an intelligent prediction tool for rice yield based on machine learning techniques
Published 2006“…Whereas kernel-based clustering algorithm is developed for finding clusters in climate data. …”
Get full text
Get full text
Article -
3
Improved elitist genetic algorithm for reactive power planning in power system / Mohamad Fadhil Mohd Kamal
Published 2010“…The genetic algorithm (GA) is a search technique based on the behaviour of natural genetics. …”
Get full text
Get full text
Thesis -
4
-
5
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…In a summarized survey of the literature, we review and compile the recent trends of researches that applied and implemented multi-agent systems in educational assessment. We discuss both agent and multi-agent systems and focus on the implications of the theory of detecting learning styles that constitutes behaviors of learners when using online learning systems, learner's profile, and the structure of multi-agent learning systems. …”
Conference Paper -
6
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
Published 2005“…This algorithm is based on the combination of Fibonacci permutation and discrete wavelet transforms (DWT). …”
Get full text
Get full text
Thesis -
7
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Most Automatic Fingerprint Identification Systems (AFIS) are based on minutiae matching due to its uniqueness. …”
Get full text
Get full text
Thesis -
8
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
Get full text
Get full text
Article -
12
Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving
Published 2013“…Achieved sets of conceptual nets constitute congruent classes. New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
Get full text
Get full text
Journal -
13
New Evolving Fuzzy System Algorithms Using Dynamic Constraint
Published 2016Get full text
Get full text
Thesis -
14
Multi-source data fusion framework for remote triaging and prioritization in telemedicine
Published 2015“…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
Get full text
Get full text
Thesis -
15
A rule-based parameter aided with object-based classification approach for extraction of building and roads from WorldView-2 images
Published 2014“…The three applied algorithms are support vector machines (SVMs), nearest neighbour (NN) and proposed rule-based system. …”
Get full text
Get full text
Article -
16
LTE-based passive radar for ground target detection and tracking
Published 2015“…Passive radar system constitute of a receiver without the co-located transmitter. …”
Get full text
Get full text
Thesis -
17
Power System State Estimation In Large-Scale Networks
Published 2010“…Power system state estimation constitutes one of the critical functions that are executed at the control centers. …”
Get full text
Get full text
Thesis -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…Second, an adaptive thresholding is used in order to constitute a binarized image. Third, Unwanted Lines Elimination Algorithm (ULEA) is used in order to enhance the image. …”
Get full text
Get full text
Thesis -
20
Secure address resolution protocol proxy in software defined network
Published 2018“…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
Get full text
Get full text
Get full text
Thesis
