Search Results - (( based constructive method algorithm ) OR ( data internalization based algorithm ))
Search alternatives:
- internalization based »
- data internalization »
- based constructive »
- method algorithm »
-
1
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
2
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An efficient and effective case classification method based on slicing
Published 2006“…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
Get full text
Get full text
Get full text
Article -
4
Robust Image Zero- Watermarking Based on Complex Zernike Moment
Published 2014“…Zero watermarking algorithm changes the operation method of embedding watermark in the original data. …”
Get full text
Get full text
Conference or Workshop Item -
5
Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR
Published 2007“…Then fuzzy B-spline algorithm for 3D object reconstruction was modified based on the phase equation modified by weighted least square method to ensure 3 D coastal geomorphology reconstruction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Clustering of rainfall data using k-means algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…These methods have been rigorously tested and compared against proprietary heuristic-based software and manual methods. …”
Get full text
Get full text
Get full text
Article -
9
Robust Image Zero-Watermarking Based on Complex Zernike Moment
Published 2014“…Zero watermarking algorithm changes the operation method of embedding watermark in the original data. …”
Get full text
Get full text
Conference or Workshop Item -
10
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Conference or Workshop Item -
13
Fuzzy Distance Measure Based Affinity Propagation Clustering
Published 2018“…AP uses the similarity between data points to calculate the messages. Hence, the construction of similarity is essential in the AP algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
15
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An ensemble method with cost function on churn prediction
Published 2019“…Therefore, this paper aims to achieve higher classification accuracy and at the same time, minimising ensemble classifiers by constructing a new ensemble method based on dimensionality reduction in soft set theory. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Pruned committee neural network based on accuracy and diversity trade-off for permeability prediction
Published 2014“…In this paper, first we constructed a committee neural network with different learning algorithms and then proposed an expert pruning method based on diversity and accuracy tradeoff to improve the committee machine framework. …”
Get full text
Get full text
Get full text
Article -
19
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
20
A Multidimensional Search Space Using Interactive Genetic Algorithm
Published 2010“…For experiment, we have selected Parametric L-System, in which both symbols and numerical parameters are evolved using Genetic Algorithm (GA). The output of this visualization helps to generate random strings and parameters, which are used to construct rules for Parametric L-System. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
