Search Results - (( java application customization algorithm ) OR ( knowledge preservation method algorithm ))
Search alternatives:
- customization algorithm »
- knowledge preservation »
- preservation method »
- java application »
- method algorithm »
-
1
Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss
Published 2021“…The proposed combined method has achieved good deblurring with edge-preserving results based on the evaluation metrics used. …”
Get full text
Get full text
Get full text
Thesis -
2
Ball surface representations using partial differential equations
Published 2015“…This algorithm is then tested in positivity preserving of surface and image enlargement problems. …”
Get full text
Get full text
Get full text
Thesis -
3
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…Unlike any other vertex clustering methods, the knowledge of neighbourhood between nodes is unnecessary and the node simplification is performed independently. …”
Get full text
Get full text
Thesis -
4
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…Unlike any other vertex clustering methods, the knowledge of neighbourhood between nodes is unnecessary and the node simplification is performed independently. …”
Get full text
Get full text
Monograph -
5
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The evaluation results show that the proposed approach outperforms the algorithms of other recognition methods used for comparison. …”
Get full text
Get full text
Thesis -
6
MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System
Published 2019“…The most difficult aspect of techniques based on fingerprints is the effect of dynamic environmental changes on fingerprint authentication.With the aim of dealing with this problem, many experts have adopted transfer-learning methods even though in WiFi indoor localization the dynamic quality of the change in the fingerprint has some cyclic factors that necessitate the use of previous knowledge in various situations. …”
Get full text
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…Protein sequence annotation is important for the preservation and reuse of knowledge, for content-based queries, and for the understanding of its function. …”
Get full text
Get full text
Monograph -
9
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Personalized one-shot local adaptation federated learning for mortality prediction in multi-center Intensive Care Unit
Published 2024“…Unlike traditional data-centralized ML methods, federated learning (FL) provides a novel and promising distributed learning scheme to promote ML in multiple healthcare institutions while preserving data privacy. …”
Get full text
Get full text
Get full text
Thesis -
11
MFA-OSELM algorithm for WiFi-based indoor positioning system
Published 2019“…With the aim of dealing with this problem, many experts have adopted transfer-learning methods, even though in WiFi indoor localization the dynamic quality of the change in the fingerprint has some cyclic factors that necessitate the use of previous knowledge in various situations. …”
Get full text
Get full text
Get full text
Article -
12
Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir
Published 2016“…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
Get full text
Get full text
Book Section -
13
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009“…The proposed method formulates a modified inertia weight algorithm by using a dynamic spread factor (SF). …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
An improved genetic-fuzzy system for classification and data analysis
Published 2017“…In the second variant classifier, we further improve the first variant classifier by enhancing the selection method of the antecedent conditions of the rules generated in the initial population of genetic algorithm. …”
Get full text
Get full text
Article -
15
A semantic conceptualization on tagged bag-of concepts to improve accuracy for sentiment Analysis
Published 2023“…Thus, contributing knowledge in SA and into the lexicon-based and hybrid approaches.…”
Get full text
Get full text
Get full text
Thesis -
16
An interpretable fuzzy-ensemble method for classification and data analysis / Adel Lahsasna
Published 2016“…In addition, the fuzzy-ensemble method has successfully preserved its interpretability compared to the fuzzy rule-based system. …”
Get full text
Get full text
Thesis -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
The development of level of detail (LOD) technique in 3D computer graphics application
Published 2009“…Unlike any other vertex clustering methods, the knowledge of neighbourhood between nodes is unnecessary and the node simplification is performed independently. …”
Get full text
Get full text
Monograph -
19
Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir
Published 2016“…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
Get full text
Get full text
Thesis -
20
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…This algorithm encode a potential solution to a specific problem on a simple chromosome like data structure and apply recombination operators to this structure to preserve critical information. …”
Get full text
Thesis
