Search Results - (( data information needs algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- data information »
- method algorithm »
- needs algorithm »
-
1
Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The proposed approach utilizes genetic algorithms to dynamically produce optimized timetables based on individual student needs, with real-time data scraping from 'iCRESS' ensuring the system stays up to date with the latest course information for accurate timetable generation. …”
Get full text
Get full text
Get full text
Article -
2
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The main algorithms involve is Dijkstra’s algorithm and then an Ant Colony Optimization algorithm is used as hybrid versions of Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Evaluation of Search Result of Document Search Based GA (DSEGA)
Published 2004“…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…In this study, Simulated Kalman Filter (SKF) is applied to image template matching application as the optimization algorithm. SKF is compared with conventional algorithms for image template matching which are performance index value (PIM) and correlation by using DC components of image (TMC) and by using power of images (TMP) methods. …”
Get full text
Get full text
Thesis -
5
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…Today, the advancement of information technology has led to a growing need for continuous processing of significant events, such as enhanced methods for monitoring road speed and mobile computing. …”
Get full text
Get full text
Get full text
Thesis -
6
An ensemble feature selection method to detect web spam
Published 2018“…Web spam detection is one of research fields of data mining. With regard to increasing available information in virtual space and the need of users to search, the role of search engines and used algorithms are important in terms of ranking. …”
Get full text
Get full text
Get full text
Article -
7
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
Get full text
Get full text
Thesis -
8
Optimizing the Management of Knowledge Assets using Swarm Intelligence
Published 2018“…This study presents the employment of swarm intelligence algorithm, i.e Firefly Algorithm, to automatically cluster text document without the use of k value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…The objectives of this project are to use FCM as the clustering algorithm to establish TLPs. …”
Get full text
Get full text
Thesis -
11
GA Based Feature Recognition of Step File for CAD/CAM Integration
Published 2009“…This technique used standard for exchange of product information (STEP) formats for geometrical data extraction representation to matching the coordinate from STEP file to decide the correct or optimize solution. …”
Get full text
Get full text
Get full text
Thesis -
12
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…The method proposed is to design DNA assembly algorithms in Verilog HDL and implemented it in ASIC design flow. …”
Get full text
Get full text
Thesis -
13
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
14
Deep reinforcement learning online offloading for SWIPT multiple access edge computing network
Published 2021“…This method no longer needs to solve combinatorial problems. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
15
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
16
Computational intelligence method for optimal rotary design system
Published 2008“…The objective of this project was to investigate and compare different algorithms for the calculation of velocity from position information. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
Get full text
Get full text
Article -
18
The impact of new technologies (AI, Blockchain & Big Data) in the accounting profession
Published 2025“…Moreover, the reliance on AI and Big Data analytics introduces concerns about algorithmic bias, inaccuracies, and the ethical use of data. …”
Get full text
Get full text
Article -
19
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…This method seeks to ensure secure and effective data concealment by identifying and utilizing noisy zones in images, making it more difficult for steganalysis tools to detect the embedded information. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Locating Optimum Receiver Position in Seismic Acquisition: Example from Carbonate Region
Published 2017“…We can improve the seismic images in hand either by the implementation of complex migration algorithm or by conducting a fresh seismic data acquisition within the affected region. …”
Get full text
Get full text
Article
