Search Results - (( initial collection system algorithm ) OR ( using codification using algorithm ))

Refine Results
  1. 1

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  2. 2

    Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors by AlRijeb, Mothena Fakhri Shaker, Othman, Mohammad Lutfi, Ishak, Aris, Hassan, Mohd Khair, Albaker, Baraa Munqith

    Published 2025
    “…Irrelevant features in data collected from oil refineries affect system performance due to conflicts between normal data and detected faults. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A customized non-exclusive clustering algorithm for news recommendation systems by Ibrahim, Hamidah, Sidi, Fatimah, Mustapha, Aida, Darvishy, Asghar

    Published 2019
    “…An experiment is carried out using a real dataset which is collected from the news websites. The experimental results demonstrated that the OC outperforms the k-means algorithm with respect to Precision, Recall, and F1-Score.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Location Fingerprinting Technique for WLAN Device-Free Indoor Localization System by Pirzada, N., Nayan, M.Y., Subhan, F., Abro, A., Hassan, M.F., Sakidin, H.

    Published 2017
    “…The database of RSSI fingerprint is created initially and then a fingerprint-based algorithm is developed for locating the position of a human body in the indoor environment. …”
    Get full text
    Get full text
    Article
  7. 7

    WLAN location fingerprinting technique for device-free indoor localization system by Pirzada, N., Nayan, M.Y., Hassan, M.F., Subhan, F., Sakidin, H.

    Published 2016
    “…The database of RSSI fingerprint is created initially and then a fingerprint-based algorithm is developed for locating the position of a human body in the indoor environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…The research contribution lies in utilizing the SED algorithm to tune the parameters of the Hammerstein model specifically for the cupping suction system and figure out the real system with a continuous-time transfer function. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  10. 10

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Series division method based on PSO and FA to optimize Long-Term Hydro Generation Scheduling by Hammid, Ali Thaeer, M. H., Sulaiman

    Published 2018
    “…Whereas, each division is a developmental algorithm which used to get the global point. The extent of the SDM is often offered a quicker convergence so as to accomplish the best initial operation to swarm's algorithm research. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Diagnosis and treatment recommender system for myocardial infarction using decision tree and Support Vector Machines (SVM) / Wan Marzuqiamrin Wan Mansor by Wan Mansor, Wan Marzuqiamrin

    Published 2025
    “…This project presents the development process of the prototype for diagnosis and treatment recommender system for myocardial infarction using decision tree and support vector machine (SVM) algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Development of airbag suit system for motorcyclist by Zainal Abidin, Zulkifli, Razali, Fakhruddin

    Published 2014
    “…The calibration involved a sizable collection of samples, analysis and training to set the threshold in the algorithm which decides the emergency events. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Text Summarization System with Bayesian Theorem on Oil & Gas Drilling Topic by Kurniawan, Iwan

    Published 2007
    “…This algorithm is used to extract the important points from a lengthy document, by which it classifies each word in the document under its relevant probability of the word's likeliness to be included in the summary given the corpus containing the summary done by the experts as the initial probability. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Automated transtibial prosthesis alignment: A systematic review by Khamis T., Khamis A.A., Al Kouzbary M., Al Kouzbary H., Mokayed H., Razak N.A.A., Osman N.A.A.

    Published 2025
    “…Collectively, this review emphasizes the immense potential of automated transtibial prosthesis alignment systems to enhance alignment accuracy and significantly reduce human error. …”
    Review
  19. 19

    Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory by Abdulrazak Yahya, Saleh, Shahrulnizam, Medang, Ashraf, Osman Ibrahim

    Published 2020
    “…As such, biosurveillance system developers are looking for highly sensitive outbreak prediction algorithms that will minimise the number of false alarms. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis