Search Results - (( developing formative source algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1
  2. 2

    Developement of 3D virtual environment for Teratai College, UiTM Shah Alam using open source platform / Tengku Mohd Najib Tengku Ishak by Tengku Ishak, Tengku Mohd Najib

    Published 2006
    “…Another objective is to implement the virtual environment visit using open source platform which perhaps may generates more 3D project using open source platform. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications by Bello Tambawal, Abubakar, Noor, Rafidah Md, Salleh, Rosli, Chembe, Christopher, Oche, Michael

    Published 2019
    “…In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
    Get full text
    Get full text
    Article
  7. 7

    SNR Based DSDV Routing Protocol for MANET by Mohd Fairuz, Muhamad Fadzil

    Published 2012
    “…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Analysis of daytime and nighttime ground level ozone concentrations using boosted regression tree technique by Yahaya, Noor Zaitun, Ghazali, Nurul Adyani, Ahmad, Sabri, Mohammad Asri, Mohammad Akmal, Ibrahim, Zul Fahdli, Ramli, Nor Azman

    Published 2017
    “…Results showed that the model developed was within the acceptable range and could be used to understand ozone formation and identify potential sources of ozone for estimating O3 concentrations during daytime and nighttime Results indicated that the wind speed, wind direction, relative humidity, and temperature were the most dominant variables in terms of influencing ozone formation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…However, this energy source differs considerably from the conventional generation sources because it is intermittent in nature and may lead to high-risk levels in the electrical system reliability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Trace analyzer for NS-2 by Salleh A.U., Ishak Z., Din N.Md., Jamaludin M.Z.

    Published 2023
    “…This layer processes the data obtain from the source and convert it to meaningful format for the third layer. …”
    Conference paper
  14. 14
  15. 15

    Smart citation manager by Teh, Zhi Yun

    Published 2019
    “…(iv) Text extraction algorithm facilitate the retrieving text from PDF document to mind map. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    An artificial intelligence approach to monitor student performance and devise preventive measures by Khan I., Ahmad A.R., Jabeur N., Mahdi M.N.

    Published 2023
    “…In addition, the prediction model is transformed into a clear shape to make it easy for the instructor to prepare the necessary precautionary procedures. We developed a set of prediction models with distinct machine learning algorithms. …”
    Article
  17. 17

    Predicting the maturity and organic richness using artificial neural networks (ANNs): A case study of Montney Formation, NE British Columbia, Canada by Barham, A., Ismail, M.S., Hermana, M., Padmanabhan, E., Baashar, Y., Sabir, O.

    Published 2021
    “…Total Organic Carbon (TOC) and maturity level (Tmax) for any source rock considered to be the key parameters for evaluating its potentiality. …”
    Get full text
    Get full text
    Article
  18. 18

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
    Get full text
    Thesis
  19. 19

    Optimal sizing of autonomous hybrid microgrids with economic analysis using grey wolf optimizer technique by Tukkee, Ahmed Sahib, Abdul Wahab, Noor Izzri, Mailah, Nashiren Farzilah

    Published 2023
    “…Different configurations of hybrid Microgrids are proposed comprising various generating re�sources to meet the electrical load of small villages in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20