Search Results - (( java applications optimisation algorithm ) OR ( knowledge identification function algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…Conservative regular moments have been proven to exhibit some shortcomings in the original formulations of moment functions in terms of scaling factor. Hence, an incorporated scaling factor of geometric functions into United Moment Invariant function is proposed for mining the feature of unconstrained words. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…Thus, in order to provide better access to relevant knowledge, the knowledge of metabolic pathway should be conceptualized and formalized using appropriate knowledge representation technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam by Rustam, Ilham

    Published 2015
    “…Comparison results have shown that the pre-screening method has an essential role in determining an effective process representation especially in real-time multivariable identification framework where a priori knowledge is not available and would help in resultant model generalization performance as opposed to simply using all available model input variables. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan by Ahmat Ruslan, Fazlina

    Published 2015
    “…Comparison results have shown that the pre-screening method has an essential role in determining an effective process representation especially in real-time multivariable identification framework where a priori knowledge is not available and would help in resultant model generalization performance as opposed to simply using all available model input variables. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control by Mohd. Noor, Nurul Muthmainnah, Ahmad, Salmiah

    Published 2015
    “…Each fuzzy rule (FR) for this system is based on the form of IF-THEN rule. Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd... by Sharifah Nabilah , Syed Mohd Hamdan

    Published 2024
    “…MIMICS software version 21.0 (Materialise, Leuven, Belgium) was used to construct 3D models and plane-to-plane (PTP) protocol was utilised to measure 14 selected craniometric parameters. Discriminant function analysis (DFA), binary logistic regression (BLR), and several machine learning (ML) algorithms (random forest (RF), support vector machines (SVM), and linear discriminant analysis (LDA)) were used to statistically analyse the data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Development of a Neural-Fuzzy Model for Machinability Data Selection in Turning Process by Kong, Hong Shim

    Published 2008
    “…In addition, the characteristics of the model are studied and analyzed as well; in which include membership functions, shouldered membership functions and randomness. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…The experimental result shows that the XKQSS is about 20% more effective than XReal in terms of return nodes identification, a state-of-art systems for XML retrieval. …”
    Get full text
    Get full text
    Article
  16. 16

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation by Moh'd Radwan, Eyad Moh'd

    Published 2004
    “…A simple yet effective rotor time constant identification method is presented and used for updating the slip calculator used by the IRFOC algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Computational stylometric model for oath and oath-like expressions in Quranic text by Alqurneh, Ahmad

    Published 2014
    “…Next, is the lexical features bag, which include token-based features, short words features, word n-gram features, vocabulary richness functions, Hapax Legomena, Hapax Dislegomena, and frequent function words that discriminate oath-takers in achieving generalization. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Signal to noise ratio as a guideline to obtain valid auditory brainstem response results by Dzulkarnain, Ahmad Aidil Arafat

    Published 2020
    “…Auditory brainstem response (ABR) is regards as one of the important tests to assess the auditory brainstem function and to estimate hearing thresholds. Whilst ABR is considered objective from the patient point of view, the interpretation of the ABR requires substantial knowledge from the perspective of an audiologist. …”
    Get full text
    Get full text
    Get full text
    Article