Search Results - (( developing formative affect algorithm ) OR ( java implication from algorithm ))*
Search alternatives:
- developing formative »
- formative affect »
- affect algorithm »
- java implication »
- implication from »
- from algorithm »
-
1
A New Cell Formation Method Considering Operation Sequences And Production Volumes
Published 2013“…This research, presents an algorithm for cell formation to minimize intercellular movements. …”
Get full text
Get full text
Thesis -
2
Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm
Published 2018“…Primarily, this research is about the optimization of triaxial ceramic employing the POFA process by the Taguchi design and Flower Pollination Algorithm (FPA). The recycled POFA was evaluated through the POFA layer formation method where selected POFA layers were employed as filler raw material. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…To address the noise problem in multi-view data, this study enhances the gbs method and develops a new self-weighted graph multi-view clustering algorithm (swmcan). …”
Get full text
Get full text
Thesis -
4
-
5
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
Get full text
Get full text
Article -
6
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…This is accomplished through modification of the technique employed by [1] to fit Hausa NSWs' formation. It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Empirical relationship on vortex formation and heat transfer coefficient (HTC) using synthetic jet cooling / Nawal Radhiah Mohamad Nasir
Published 2023“…Distance range of 50 mm is adequate for the vortex to have strength and coherence without been affecting by the reverse suction flow. The ability of the vortex formation to reach the heated surface is important to maximize the HTC value and the radius of vortex formation does not play huge role if the distance between the vortex formation and the heated plate is high. …”
Get full text
Get full text
Thesis -
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
11
Modular deep neural network in reducing overfitting to enhance generalization / Mohd Razif Shamsuddin
Published 2024“…In the first phase, the NN is tested with two different data formatting to ensure which data format is more suitable for the next consecutive experiments. …”
Get full text
Get full text
Thesis -
12
Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina
Published 2024“…This study demonstrates the mass loss of monolithic and Ni-reinforced porous alumina developed using rice husk and sugarcane bagasse in acidic and alkaline corrosive media. …”
Get full text
Get full text
Get full text
Article -
13
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…Furthermore, a new algorithm was also developed to provide an efficient CH leadership transition from PCH to SeCH when the PCH can no longer continue with the leadership responsibility. …”
Get full text
Get full text
Get full text
Thesis -
14
Performance Analysis of Duty-Cycle Division Multiplexing for Optical Fiber Communication Systems
Published 2009“…In this study, the design of DCDM multiplexer and demultiplexer is improved. A new set of algorithm are developed for data recovery in the receiver. …”
Get full text
Get full text
Thesis -
15
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…The higher speed up factor in TALLOR indicated that the performance of the proposed multi-frames watermarking scheme is affected by the algorithm complexity of the adopted watermarking scheme and the number of frames in medical images processed.…”
Get full text
Get full text
Thesis -
16
Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz
Published 2020“…The conversion of handwritten image into digital format required more time and often affected by errors. …”
Get full text
Get full text
Thesis -
17
Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina
Published 2025“…This study demonstrates the mass loss of monolithic and Ni-reinforced porous alumina developed using rice husk and sugarcane bagasse in acidic and alkaline corrosive media. …”
Article -
18
Customer behavior analysis based on purchasing history and reviews using automated decision-making systems
Published 2025“…Techniques: Then, the decision-making process is used to analyze the customer’s data using the regression algorithm. Result: This results in the proposed model, the relationship of the many business models, the formation of the purchases that affect consumer needs, and the strategies that can be developed. …”
Get full text
Get full text
Article -
19
Geometrical and dimensional defect evaluation of cold forged AA6061 propeller blade
Published 2013“…In this study,defect was considered based on profile deviation, which was obtained from the 3D surface measurement technique. An algorithm was developed to measure the deviation. The result showed that the thickness error depended on the deformation ratio whereas the twist angle accuracy relied on the amount of twist and thickness of the blade. …”
Get full text
Get full text
Thesis -
20
Preserving the confidentiality of final examination question paper using image steganography technique / Aviefieorennia Tompell
Published 2016“…This project focus on the Least Significant Bit algorithm in Image Steganography while providing a practical understanding of what Steganography is and how to accomplish it. …”
Get full text
Get full text
Student Project
