Search Results - (( java implementation bat algorithm ) OR ( knowledge driven implementation algorithm ))
Search alternatives:
- implementation algorithm »
- driven implementation »
- java implementation »
- implementation bat »
- knowledge driven »
- bat algorithm »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Clustering for binary data sets by using genetic algorithm-incremental K-means
Published 2018“…This research was initially driven by the lack of clustering algorithms that specifically focus in binary data. …”
Get full text
Get full text
Article -
3
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…The widely used conventional control that is based on mathematical model of the controlled system is very complex and not easy to be determined since it requires explicit knowledge of the motor and load dynamics. This thesis proposed a design and implementation of a PLC-based hybrid controller from a basic PLC to a PWM-driven variable-voltage variable-frequency (VVVF) speed control of an induction motor and the analysis, evaluation and improvement of the control strategies. …”
Get full text
Get full text
Thesis -
4
Predicting YSPSAH's product preferences across department of private hospitals
Published 2025“…Future enhancements could involve integrating real-time data and testing advanced forecasting algorithms to improve model performance. Overall, this project demonstrates the potential of predictive modelling and MBA to transform historical sales data into strategic knowledge, optimising procurement planning and enhancing operational efficiency in the pharmaceutical industry.…”
Get full text
Get full text
Student Project -
5
Accept or reject? Predicting ideation outcomes through enterprise social media
Published 2017“…Implementing social media in the workplace may make it easier for employees to participate in knowledge sharing activities such as Q&A and ideation.However, vetting the quality of answers and ideas becomes more complex when anyone in the company can contribute. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Fuzzy expert system modeling of laser processing
Published 2009“…The objective of the paper is: to design knowledge based rules, algorithm, architecture & learning ability to develop fuzzy surface roughness predictive model for laser machining; to develop fuzzy predictive model using design parameters which were critically analyzed; to make a comparative study of the observed and modelled surface roughness output of 5mm Mn-Mo pressure vessel plate. …”
Get full text
Get full text
Article -
8
Intelligent material handling mobile robot for industrial purpose with active force control capability
Published 2005“…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
Get full text
Get full text
Monograph -
9
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
10
Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali
Published 2013“…The thesis presents the design, necessary data structures, algorithms and implementation details of JLOG. The results of comparing the performance of JLOG to regular PROLOG and Tabled PROLOG systems are also presented.…”
Get full text
Get full text
Get full text
Thesis -
11
Fusion of airborne LiDAR with multispectral SPOT 5 image for enhancement of feature extraction using Dempster–Shafer theory
Published 2014“…The two products were fused using the DST algorithm, and the accuracy of the classification was assessed. …”
Get full text
Get full text
Article -
12
Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies
Published 2020“…They play the most important roles in implementing construction projects, and their activities have a significant impact on their risk attitudes during the execution of projects. …”
Get full text
Get full text
Get full text
Get full text
Article
