Search Results - (( based constructive method algorithm ) OR ( data internalization based algorithm ))

Refine Results
  1. 1
  2. 2

    Knowledge base processing method based on text classification algorithm by Baisheng Zhong, Mohd Shamrie Sainin, Tan Soo Fun

    Published 2023
    “…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An efficient and effective case classification method based on slicing by Shiba, Omar A. A., Sulaiman, Md. Nasir, Mamat, Ali, Ahmad, Fatimah

    Published 2006
    “…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Robust Image Zero- Watermarking Based on Complex Zernike Moment by Khalid, Edris, Fakhreldin, Mohammed Adam Ibrahim, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2014
    “…Zero watermarking algorithm changes the operation method of embedding watermark in the original data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR by Marghany, Maged, Hashim, Mazlan

    Published 2007
    “…Then fuzzy B-spline algorithm for 3D object reconstruction was modified based on the phase equation modified by weighted least square method to ensure 3 D coastal geomorphology reconstruction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…These methods have been rigorously tested and compared against proprietary heuristic-based software and manual methods. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Robust Image Zero-Watermarking Based on Complex Zernike Moment by Edris, Khalid, Fakhreldin, Mohammed Adam Ibrahim, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2014
    “…Zero watermarking algorithm changes the operation method of embedding watermark in the original data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Fuzzy Distance Measure Based Affinity Propagation Clustering by Al-Akash, Omar Mahmoud Nayef, Syed Ahmad, Sharifah Sakinah, Azmi, Mohd Sanusi

    Published 2018
    “…AP uses the similarity between data points to calculate the messages. Hence, the construction of similarity is essential in the AP algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  15. 15

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An ensemble method with cost function on churn prediction by Mohd Khalid, Awang, Mohammad Afendee, Mohamed, Mokhairi, Makhtar

    Published 2019
    “…Therefore, this paper aims to achieve higher classification accuracy and at the same time, minimising ensemble classifiers by constructing a new ensemble method based on dimensionality reduction in soft set theory. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Pruned committee neural network based on accuracy and diversity trade-off for permeability prediction by Kenari, Seyed Ali Jafari, Mashohor, Syamsiah

    Published 2014
    “…In this paper, first we constructed a committee neural network with different learning algorithms and then proposed an expert pruning method based on diversity and accuracy tradeoff to improve the committee machine framework. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Multidimensional Search Space Using Interactive Genetic Algorithm by Farooq, H., Zakaria, M.N., Hassan, M.F., Sulaiman, Suziah

    Published 2010
    “…For experiment, we have selected Parametric L-System, in which both symbols and numerical parameters are evolved using Genetic Algorithm (GA). The output of this visualization helps to generate random strings and parameters, which are used to construct rules for Parametric L-System. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item