Search Results - (( construct normalization techniques algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    The Anglerfish algorithm: a derivation of randomized incremental construction technique for solving the traveling salesman problem by Pook, Mei Foong, Ramlan, Effirul Ikhwan

    Published 2019
    “…Critics have called for a realignment in the bio-inspired metaheuristics field. We propose an algorithm that simplifies the search operation to only randomized population initialization following the Randomized Incremental Construction Technique, which essentially compartmentalizes optimization into smaller sub-units. …”
    Get full text
    Get full text
    Article
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Smart diagnosis of long bone tumor / Mazni Parimin by Parimin, Mazni

    Published 2005
    “…The construction of this prototype consist of neural network training and testing process, where the backpropagation training algorithm are used to recognize the data sample provided via a user-friendly interfaces. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique by Mohd Mawardi, Saari, Mohd Herwan, Sulaiman, Kiwa, Toshihiko

    Published 2023
    “…In this work, the core size estimation technique of magnetic nanoparticles (MNPs) using the static magnetization curve obtained from a high-Tc SQUID magnetometer and a metaheuristic inversion technique based on the Particle Swarm Optimizer (PSO) algorithm is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…Various k-means clustering algorithms and model-based clustering algorithms are proposed to group the genes. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The algorithm involved the construction of the nodes of a lexicographic tree that represent frequent patterns. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Machine condition monitoring and fault diagnosis using spectral analysis techniques by Salami, Momoh Jimoh Eyiomika, Abdul Muthalif, Asan Gani, Pervez, T.

    Published 2001
    “…Vibration data are collected from the piezoelectric accelerometers placed at locations that provide rigid vibration transmission to them. Both normal and fault signals are analyzed using the singular value decomposition (SVD) algorithm so as to compute the parameters of the auto regressive moving average (ARMA) models. …”
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems by Ismail, Razidah

    Published 2005
    “…The main objective of this study is to develop a novel inverse modeling technique, known as Fuzzy State Space Model (FSSM). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…The models were trained with normalized and non-normalized data. The selected ANFIS model was trained with normalized data with 6 Gaussian membership functions for each of 9 inputs and 6 rules. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A pre-evaluation step towards a guaranteed consistent AHP-based pairwise comparison by Engku Abu Bakar, Engku Muhammad Nazri, Balhuwaisl, M., Mat Kasim, Maznah

    Published 2016
    “…Reports by various researchers show that ensuring pairwise comparison consistency is one of the main issues when applying analytic hierarchy process (AHP) in a decision making activity. Normally, in the case where inconsistencies are found, the evaluators might have to redo the pairwise comparisons, hence, disturbing the original preference.In this paper, we proposed an evaluation step prior to conducting the pairwise comparison in order to eliminate inconsistent comparisons.The evaluation step involves the rating of importance of criteria using a scale of 1- 9 whereby 1 represents least important while 9 represents extremely important.The resulted ratings are then used as a guide to construct the AHP-pairwise comparison matrix by using certain simple algorithm that is also proposed in this paper.Once the pairwise comparison matrix is obtained, the weights of criteria can be calculated using the existing AHP-technique. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Prediction of cause of death from forensic autopsy reports using text classification techniques: A comparative study by Mujtaba, Ghulam, Shuib, Liyana, Raj, Ram Gopal, Rajandram, Retnagowri, Shaikh, Khairunisa

    Published 2018
    “…The six different text classification techniques were applied on these 43 master feature vectors to construct a classification model that can predict the cause of death. …”
    Get full text
    Get full text
    Article
  18. 18

    Enhancement of compound word extraction in Malay sentences using modified linguistics approaches / Zamri Abu Bakar by Abu Bakar, Zamri

    Published 2023
    “…Overall, this study has three objectives; to identify new rules in detecting the Malay compound word, to construct an improved compound word extraction technique (algorithm) that combines many rules for Malay sentences using linguistic approaches, and lastly to evaluate the accuracy of proposed technique from using the standard evaluation of Recall, Precious and F-Measure. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Global and local clustering soft assignment for intrusion detection system: a comparative study by Mohd Rizal Kadis, Azizi Abdullah

    Published 2017
    “…In literature, many researchers used global clustering approach whereby all input will be combined and clustered to construct a codebook. However, there is an alternative technique namely local clustering approach whereby the input will be split into 5 different categories and clustered independently to construct 5 different codebooks. …”
    Get full text
    Get full text
    Get full text
    Article