Search Results - (( based constitutional system algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm) by Abd Razak, Nuur Farhani

    Published 2017
    “…Therefore, it is difficult for the users to find all the inter-related acts from the federal constitutional using manual method. In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Development of an intelligent prediction tool for rice yield based on machine learning techniques by Md. Sap, Mohd. Noor, Awan, A. M.

    Published 2006
    “…Whereas kernel-based clustering algorithm is developed for finding clusters in climate data. …”
    Get full text
    Get full text
    Article
  3. 3

    Improved elitist genetic algorithm for reactive power planning in power system / Mohamad Fadhil Mohd Kamal by Mohd Kamal, Mohamad Fadhil

    Published 2010
    “…The genetic algorithm (GA) is a search technique based on the behaviour of natural genetics. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection by Basheer G.S., Ahmad M.S., Tang A.Y.C.

    Published 2023
    “…In a summarized survey of the literature, we review and compile the recent trends of researches that applied and implemented multi-agent systems in educational assessment. We discuss both agent and multi-agent systems and focus on the implications of the theory of detecting learning styles that constitutes behaviors of learners when using online learning systems, learner's profile, and the structure of multi-agent learning systems. …”
    Conference Paper
  6. 6

    Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation by Salem Hussin, Saleh Hussin

    Published 2005
    “…This algorithm is based on the combination of Fibonacci permutation and discrete wavelet transforms (DWT). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Most Automatic Fingerprint Identification Systems (AFIS) are based on minutiae matching due to its uniqueness. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
    Get full text
    Get full text
    Article
  12. 12

    Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving by Tirri, Seppo Ilari

    Published 2013
    “…Achieved sets of conceptual nets constitute congruent classes. New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
    Get full text
    Get full text
    Journal
  13. 13
  14. 14

    Multi-source data fusion framework for remote triaging and prioritization in telemedicine by Salman, Omar Hussein

    Published 2015
    “…As telemedicine consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the proposed frameworks as fusion algorithm in the base station and as healthcare services algorithm in the server was demonstrated. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A rule-based parameter aided with object-based classification approach for extraction of building and roads from WorldView-2 images by Ziaei, Zahra, Pradhan, Biswajeet, Mansor, Shattri

    Published 2014
    “…The three applied algorithms are support vector machines (SVMs), nearest neighbour (NN) and proposed rule-based system. …”
    Get full text
    Get full text
    Article
  16. 16

    LTE-based passive radar for ground target detection and tracking by Salah, Asem Ahmad Mohamad

    Published 2015
    “…Passive radar system constitute of a receiver without the co-located transmitter. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Power system state estimation constitutes one of the critical functions that are executed at the control centers. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A Fast Vertical Edge Detection Algorithm for Car License Plate Detection by Ali Al-Ghaili, Abbas Mohammed

    Published 2009
    “…Second, an adaptive thresholding is used in order to constitute a binarized image. Third, Unwanted Lines Elimination Algorithm (ULEA) is used in order to enhance the image. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis