Search Results - (( java implementation ant algorithm ) OR ( knowledge driven process algorithm ))
Search alternatives:
- java implementation »
- implementation ant »
- process algorithm »
- knowledge driven »
- driven process »
- ant algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
2
An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease
Published 2019Get full text
Get full text
Conference or Workshop Item -
3
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Then, the random forests algorithms (RFs), a data-driven method, are adopted to train the fault diagnosis classifier and regression algorithm with the processed fault data. …”
Get full text
Get full text
Get full text
Article -
4
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…Based on the best model, knowledge of how various parameters influence biohydrogen production can be employed in designing an optimized bioreactor that could maximize production processes. …”
Get full text
Get full text
Article -
5
Google the earth: what's next?
Published 2010“…Considering the exponential growth of data volumes driven by the rapid progress in sensor and computer technologies in recent years, the future of remotely sensed data should ideally be in automated data processing, development of robust and transferable algorithms and processing chains that require little or no human intervention. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
6
Agent driven Peer-to-Peer Cloud Robotics
Published 2013“…These servers provide gateways to access the infrastructure, platform, software, algorithm or process as a service. Tapping into online infrastructure and knowledge saves the cost of carrying all required capabilities onboard the robot. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An expert knowledge based decommissioning alternative selection system for fixed oil and gas assets in the South China Sea
Published 2017“…A review on the decommissioning industry and its growing need for data-driven management are presented. Analytic Hierarchy Process (AHP) is utilized to solve the Multi-Criteria Decision Making (MCDM) problem of choosing the best practicable decommissioning alternative. …”
Get full text
Get full text
Article -
8
Rank-based optimal neural network architecture for dissolved oxygen prediction in a 200L bioreactor
Published 2017“…Formulation of bioprocess model using process data or data driven technique is able to describe the true process conditions better than a model driven technique that focused on ideal steady state condition of process map the relationship of DO concentration with other physical and chemical process variable that has influence on the process. …”
Get full text
Get full text
Conference or Workshop Item -
9
An embedding traid-bit method to improve the performance of Arabic text steganography
Published 2016“…The study found that the evaluation of the proposed method provides good knowledge to steganographer to improve the performance of embedding process when the Arabic text steganography method is developed.…”
Get full text
Get full text
Get full text
Thesis -
10
Accelerating color theory-based design through artificial intelligence: a conceptual welcome
Published 2025“…While traditional color selection relies heavily on human intuition, theoretical knowledge, and iterative experimentation, AI systems offer predictive modeling and data-driven recommendations that align with established color harmony principles (Jain et al., 2022). …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
LINGUISTIC FUZZY MODELING IN LASER MACHINING QUALITY EVALUATION
Published 2007“…The aim of this scientific research is to design knowledge based linguistic rules, algorithm, architecture & learning ability and further develop fuzzy model for laser machining kerf edge quality prediction. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Accept or reject? Predicting ideation outcomes through enterprise social media
Published 2017“…Research on the use of social media for Q&A has shown that certain characteristics and reputation algorithms can help determine the best answers.Less is known about the ideation process and the way it plays out in social media.This paper explores the use of enterprise social media (ESM) for ideation by employees in a large Russian organization distributed across nine time zones.In particular, we explore which characteristics of both ideas and their contributors predict whether ideas get accepted or rejected.Our analysis is based on logistic regression analysis of a sample of 488 ideas contributed in an ESM tool used in the organization as well as a content analysis of the types of ideas generated.Our results suggest that rather than being truly democratic and decentralized, ideation in ESM is driven by those in (or proximate to) positions of organizational power.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Feature engineering techniques to classify cause of death from forensic autopsy reports / Ghulam Mujtaba
Published 2018“…These master feature vectors were fed as input to six machine learning algorithms to construct and evaluate the classification models. …”
Get full text
Get full text
Get full text
Thesis -
16
Primary care provider’s barriers to effective management of apparently resistant hypertension in Malaysian public primary health care and strategies to overcome them: a qualitative...
Published 2026“…Theme 2: Provider (Subthemes: knowledge gaps, diagnostic uncertainty, workload pressures and time constraints, therapeutic hesitancy in complicated cases). …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A spatial decision support system framework for optimization of cropping pattern and water resources allocation at pasargard plains, fars province, Iran
Published 2014“…Moreover, the applicability of the present models can be limited due to the absence of inclusive frameworks in which the decision-maker could input his/her knowledge of the problem, properly model the hydrological and economic processes, test various scenarios, and arrive at judicious decisions. …”
Get full text
Get full text
Thesis -
18
Fusion of airborne LiDAR with multispectral SPOT 5 image for enhancement of feature extraction using Dempster–Shafer theory
Published 2014“…The two products were fused using the DST algorithm, and the accuracy of the classification was assessed. …”
Get full text
Get full text
Article -
19
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis
