Search Results - (( java application optimisation algorithm ) OR ( knowledge utilisation data algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…By defining the data, machines (or computers) will be able to create information and later on transform it into knowledge. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This algorithm can also be used for task scheduling. The proposed algorithm efficiently maps and achieves the objective function for server consolidation, optimising energy consumption, VM migrations, and server utilisation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Nearest neighbour group-based classification by Samsudin, Noor A., Bradley, Andrew P.

    Published 2010
    “…The purpose of group-based classification (GBC) is to determine the class label for a set of test samples, utilising the prior knowledge that the samples belong to same, but unknown class. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Predictive modeling of chlorophyll a for tropical lake by means of hybrid evolutionary algorithm (HEA) by Ishak, Mohd Yusoff, Cao, Hong Qing, Recknagel, Friedrich

    Published 2013
    “…Outcomes of this research offers an original contribution to the knowledge domain Ecology of Tropical Lakes by successfully applying data driven models (HEA).…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A case study on quality of sleep and health using Bayesian networks by Hong , Choon Ong, Chiew , Seng Lee, Chye , Ching Sia

    Published 2012
    “…A structural learning is conducted on the data to learn the correct network structure. There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
    Get full text
    Article
  8. 8

    Exploiting Bayesian belief network for adaptive IP-reuse decision by Azman, Amelia Wong, Bigdeli, Abbas, Biglari-Abhari, Morteza, Mohd Mustafah, Yasir, Lovell, Brian

    Published 2009
    “…In this work, the concept of Bayesian Belief Network (BBN) is utilised and incorporated into the proposed framework. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    An improvement of back propagation algorithm using halley third order optimisation method for classification problems by Abdul Hamid, Norhamreeza

    Published 2020
    “…This algorithm utilises first order optimisation method namely Gradient Descent (GD) method which attempts to minimise the error of network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A grid enabled E-theses and dissertations repository system by Por, L.Y., Ong, S.Y., Beh, D., Ismail, M.

    Published 2002
    “…For future direction, research will be focused on searching algorithm using data mining or pattern discovery to minimise the respond time.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A framework for automatic modelling of survival using fuzzy inference. by Hamdan, Hazlina, Garibaldi, Jonathan M.

    Published 2012
    “…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd... by Sharifah Nabilah , Syed Mohd Hamdan

    Published 2024
    “…Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…However, due to the drawbacks of the conventional algorithm as well as the heuristic algorithms handling complicated and multi-objective reservoir optimisation, the advantages of the strategy of simultaneous exploration and exploitation led to the decision to utilise meta-heuristic algorithms in this study. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Depth value approximation of 2D complex-shape objects for 3D modelling using optical flow and trigonometry by Ng, Seng Beng

    Published 2015
    “…Colour information of the feature points can be extracted as well. Data enhancement algorithms were implemented to perform noise filtering and inverse perspective mapping (IPM). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software by Dawood, Kareem Abbas

    Published 2021
    “…Integration of the best-worst method (BWM) and VIKOR MCDM techniques have been used for weighting and ranking OSS alternatives. BWM is utilised for weighting of evaluation criteria, whereas VIKOR is applied to rank OSS-LMS alternatives. …”
    Get full text
    Get full text
    Thesis
  19. 19