Search Results - (( java applications optimisation algorithm ) OR ( knowledge identification function algorithm ))
Search alternatives:
- applications optimisation »
- knowledge identification »
- identification function »
- optimisation algorithm »
- function algorithm »
- java applications »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Discretization of integrated moment invariants for writer identification
Published 2008“…Conservative regular moments have been proven to exhibit some shortcomings in the original formulations of moment functions in terms of scaling factor. Hence, an incorporated scaling factor of geometric functions into United Moment Invariant function is proposed for mining the feature of unconstrained words. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg
Published 2006“…Thus, in order to provide better access to relevant knowledge, the knowledge of metabolic pathway should be conceptualized and formalized using appropriate knowledge representation technique. …”
Get full text
Get full text
Thesis -
6
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
7
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…TCP factors and a weighted fitness function are also used for test case optimisation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam
Published 2015“…Comparison results have shown that the pre-screening method has an essential role in determining an effective process representation especially in real-time multivariable identification framework where a priori knowledge is not available and would help in resultant model generalization performance as opposed to simply using all available model input variables. …”
Get full text
Get full text
Thesis -
9
Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan
Published 2015“…Comparison results have shown that the pre-screening method has an essential role in determining an effective process representation especially in real-time multivariable identification framework where a priori knowledge is not available and would help in resultant model generalization performance as opposed to simply using all available model input variables. …”
Get full text
Get full text
Thesis -
10
Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control
Published 2015“…Each fuzzy rule (FR) for this system is based on the form of IF-THEN rule. Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
Get full text
Get full text
Get full text
Article -
11
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
12
-
13
Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd...
Published 2024“…MIMICS software version 21.0 (Materialise, Leuven, Belgium) was used to construct 3D models and plane-to-plane (PTP) protocol was utilised to measure 14 selected craniometric parameters. Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of a Neural-Fuzzy Model for Machinability Data Selection in Turning Process
Published 2008“…In addition, the characteristics of the model are studied and analyzed as well; in which include membership functions, shouldered membership functions and randomness. …”
Get full text
Get full text
Thesis -
15
Effective keyword query structuring using NER for XML retrieval
Published 2015“…The experimental result shows that the XKQSS is about 20% more effective than XReal in terms of return nodes identification, a state-of-art systems for XML retrieval. …”
Get full text
Get full text
Article -
16
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
Get full text
Get full text
Get full text
Thesis -
17
Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation
Published 2004“…A simple yet effective rotor time constant identification method is presented and used for updating the slip calculator used by the IRFOC algorithms. …”
Get full text
Get full text
Thesis -
18
Computational stylometric model for oath and oath-like expressions in Quranic text
Published 2014“…Next, is the lexical features bag, which include token-based features, short words features, word n-gram features, vocabulary richness functions, Hapax Legomena, Hapax Dislegomena, and frequent function words that discriminate oath-takers in achieving generalization. …”
Get full text
Get full text
Thesis -
19
Signal to noise ratio as a guideline to obtain valid auditory brainstem response results
Published 2020“…Auditory brainstem response (ABR) is regards as one of the important tests to assess the auditory brainstem function and to estimate hearing thresholds. Whilst ABR is considered objective from the patient point of view, the interpretation of the ABR requires substantial knowledge from the perspective of an audiologist. …”
Get full text
Get full text
Get full text
Article
