Search Results - (( developing e centered algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Comprehensive power restoration approach using rule-based method for 11kV distribution network by Khalid A.R., Ahmad S.M.S., Shakil A., Pa N.N., Shafie R.M.

    Published 2023
    “…The chosen test configuration includes three commonly occurring cases in a distribution network - namely one feedback, two feedbacks and three feedbacks respectively. Developed algorithms are tested in two scenarios i.e. with and without technical and operational violation. …”
    Conference Paper
  7. 7
  8. 8

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone by Saipullah, Khairul Muzzammil

    Published 2013
    “…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
    Get full text
    Get full text
    Article
  9. 9

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Lexicon-based and immune system based learning methods in Twitter sentiment analysis by Jantan, Hamidah, Drahman, Fatimatul Zahrah, Alhadi, Nazirah, Mamat, Fatimah

    Published 2016
    “…The aim of this article attempts to study the potential of this method in text classification for sentiment analysis.This study consists of three phases; data preparation; classification model development using three selected Immune System based algorithms i.e. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Using web questionnaire for web-based course evaluation: advantages and disadvantages by Fariborzi, Elham, Abu Bakar, Kamariah, Kasa, Zakaria, Abu Samah, Bahaman, Abdullah, Muhammad Taufik

    Published 2017
    “…This article examines some advantages and disadvantages of conducting Web survey research especially for Web-based course evaluation at Iranian university E-learning centers. It explores current features and issues associated with Web questionnaire through the implementation of a Web questionnaire for evaluating the effectiveness of computer courses at Iranian university E-learning centers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee by Chong , Hue Yee

    Published 2023
    “…By integrating with the HS (or GSA) algorithm, the proposed metaheuristic neural networks (i.e., RBFN-DDA-HS and RBFN-DDA-GSA) can optimize the RBFN-DDA parameters and improve classification performances from the original RBFN-DDA up to 28.69% in two benchmarks datasets, which are numerical records from a bearing and steel plate system and a condition-monitoring system in a power plant (i.e., the circulating water (CW) system). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm by Abdurrahim, Salem Hamed

    Published 2004
    “…The proposed technique based on the watershed algorithm, which is applied to the gradient magnitude of the MRI data. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    A comprehensive power restoration approach using rule-based method for 11kV distribution network by Khalid, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Shakil, Asma, Nik Pa, Nawar, Mohd Shafie, Roslin

    Published 2008
    “…The chosen test configuration includes three commonly occurring cases in a distribution network - namely one feedback, two feedbacks and three feedbacks respectively. Developed algorithms are tested in two scenarios i.e. with and without technical and operational violation. …”
    Get full text
    Get full text
    Conference or Workshop Item