Search Results - (( intelligence based data algorithm ) OR ( intelligence qa76 computer algorithm ))

Refine Results
  1. 1

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4
  5. 5

    Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield. by Md. Sap, Mohd. Noor, Awan, A. Majid

    Published 2005
    “…In this paper we present a robust weighted kernel k-means algorithm incorporating spatial constraints for clustering climate data. …”
    Get full text
    Get full text
    Article
  6. 6

    Proposed intelligence systems based on digital Forensics : Review paper by Ismael Sahib, Hussein, Alsudani, Mustafa Qahtan, Ali, Mohammed Hasan, Qassim Abbas, Haydar, Moorthy, Kohbalan, Adnan, Myasar Mundher

    Published 2023
    “…The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on the forensic case studies because of the limitations of traditional methods such as analysis intensive data manually, intelligence visualization to make the evidence more understandable and intelligence system for store data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Data normalization techniques in swarm-based forecasting models for energy commodity spot price by Yusof, Yuhanis, Mustaffa, Zuriani, Kamaruddin, Siti Sakira

    Published 2014
    “…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…Finally, the effectiveness of the algorithm is evaluated based on the accuracy performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…This research proposes a low-cost alternative using intelligent fruit selection systems based on computer vision techniques to address these issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The result shows that the performance of FRA correlates strongly to PQF model with 98% correlation compared to the Kolmogorov-Smirnov Correlation Based Filter (KSCBF) algorithm with 83% correlation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Computational intelligence method for optimal rotary design system by P.Saminathan, Kantan

    Published 2008
    “…The application of computational intelligence techniques to the field of industrial robot control is discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Minimizing the number of stunting prevalence using the euclid algorithm clustering approach by Zarlis, Muhammad, Oktavia, Tanty, Buaton, Relita, Ernawan, Ferda, Andrian, Kevin

    Published 2023
    “…The solution created is to classify and cluster the prevalence of stunting to produce a pattern that can be used as best practice to be transmitted to other affected areas. The algorithm used is Euclid. The Euclid algorithm can cluster stunting prevalence data into 4 clusters with the very little category at 79%, the little category at 67%, the many categories at 51%, and the very much category at 21%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A Mobile App to Predict Disease Based on Symptoms Using Artificial Intelligence by H’ng, Sheng Wei

    Published 2023
    “…A different suitable machine learning algorithm will be used in the prediction system to predict the disease based on the symptoms of patients. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20