Search Results - (( based constructive method algorithm ) OR ( using factor method algorithm ))

Refine Results
  1. 1

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
    Get full text
    Get full text
    Research Report
  2. 2

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Then, 40 safety and health specialists were involved in carrying out a risk assessment using the existing method of risk analysis (RA) and the new proposed method of RASH. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks by Han, Fengrong, Izzeldin Ibrahim, Mohamed Abdelaziz, Liu, Xinni, Kamarul Hawari, Ghazali

    Published 2020
    “…Next, in order to reduce average hop distance error, a weighted coefficient based on beacon node hop count was constructed. A new weighted least squares method was embedded to solve nonlinear equation problem. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…The proposed method is compared with three established conventional Linear Least Squares (LLS) solution methods : Normal Equation (NE), QR factorization (QR) and Singular Value Decomposition (SVD). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
    Get full text
    Get full text
    Article
  10. 10

    Classification of stock market index based on predictive fuzzy decision tree by Khokhar, Arashid Hafeez

    Published 2005
    “…After constructing predictive FDT, Weighted Fuzzy Production Rules (WFPRs) are extracted from predictive FDT, and then more significant WFPR’s are mined by using similarity-based fuzzy reasoning method. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Using unique-prime-factorization theorem to mine frequent patterns without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2011
    “…Our algorithm works based on prime factorization and is called Prime Factor Miner (PFM). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Stepper Motor Design Optimization Using by Wong, Chin Wei

    Published 2005
    “…In general, the area of study can be divided into motor principles and construction, design methods, and digital control experiments. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The study findings indicate that the suggested Certainty Factor method is more suited for use in embedded systems or web-based applications, however it is constrained by low processing.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Prediction of river water quality based on Artificial Neural Network / Danial Mustaqim Azmi ... [et al.] by Azmi, Danial Mustaqim, Mohd Sabri, Norlina, Nik Daud, Nik Marsyahariani, Awang Abu Bakar, Nor Azila

    Published 2024
    “…In machine learning, prediction is a method that is supported by historical data and is often used in various fields. …”
    Get full text
    Get full text
    Article
  17. 17

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Predicting 30-day mortality after an acute coronary syndrome (ACS) using machine learning methods for feature selection, classification and visualization by Nanyonga Aziida, Sorayya Malek, Firdaus Aziz, Khairul Shafiq Ibrahim, Sazzli Kasim

    Published 2021
    “…Identifying a feature selection method with a classifier algorithm that produces high performance in mortality studies is essential and has not been reported before. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Rule-based embedded HMMs phoneme classification to improve Qur’anic recitation recognition by Mohammed Ali Alqadasi, Ammar, Sunar, Mohd Shahrizal, Turaev, Sherzod, Abdulghafor, Rawad Abdulkhaleq Abdulmolla, Salam, Md Sah, Alashbi, Abdulaziz Ali Saleh, Ahmed Salem, Ali, Ali, Mohammed A. H.

    Published 2022
    “…The phonemes of the Qur’anic dataset contain 21 Ayats collected from 30 reciters and are carefully analyzed from a baseline HMM-based speech recognition model. Using the Hidden Markov Model with tied-state triphones, a set of phoneme classification models optimized based on duration is constructed and integrated into a Quranic phoneme classification method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An enhanced supplier selection model based on optimized analytic network process towards sustainable information technology outsourcing by Fusiripong, Prashaya

    Published 2022
    “…However, existing ITO supplier selection models lack of sustainability criteria and risk factors. Moreover, these methods rely on human judgment in weight allocation. …”
    Get full text
    Get full text
    Get full text
    Thesis