Search Results - (( java implementation cell algorithm ) OR ( knowledge creating using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat by Mohammadreza, Moohebat

    Published 2017
    “…In the past, the growth of human knowledge was slow and limited. For instance, when an innovation was created in the 18th century in the UK, it took several months or even years for the news to reach other parts of the globe. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A near-optimal centroids initialization in K-means algorithm using bees algorithm by Mahmuddin, Massudi, Yusof, Yuhanis

    Published 2009
    “…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Developing an intelligent system to acquire meeting knowledge in problem-based learning environments by Chiang, A., Baba, M.S.

    Published 2006
    “…Similarly, the algorithm proposed in MALESAbrain can, be used to deal, the problem of conducting a meeting among learners to solve problems. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Therefore, a cryptographic algorithm has to endure cryptanalysis to ensure that it is safe for private or public use. …”
    Get full text
    Conference or Workshop Item
  9. 9

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…In the Requirement Analysis we managed to create the use case diagram and the system specification. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini by Zaini, Nurin Qistina

    Published 2023
    “…For the recognized sign language gesture, the algorithm creates a bounding box with a label. The hand signs are then translated into words, allowing medical staff to clearly understand the conversation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Investigations On Human Perceptual Maps Using A Stereo-Vision Mobile Robot by Eng, Swee Kheng

    Published 2018
    “…The outcomes indicate that the proposed computer vision techniques and computational mapping algorithms for human perceptual map building are robust and useful. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…Once the model was developed, the calculations to determine the optimum maintenance schedule were done using the dynamic programming formulation created for this maintenance scheduling problem. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Rough sets for predicting the Kuala Lumpur Stock Exchange Composite Index returns by Kok, Yit-Pong, Shamsuddin, Siti Mariyam, Alwi, Razana, Sallehuddin, Roselina, Ahmad, Norbahiah

    Published 2004
    “…There are extensive literatures available describing attempts to use artificial intelligence techniques; in particular neural networks and genetic algorithm for analyzing stock market variations.However, drawbacks are found where neural networks have great complexity in interpreting the results; genetic algorithms create large data redundancies.A relatively new approach, the rough sets are suggested for its simple knowledge representation, ability to deal with uncertainties and lowering data redundancies.In this study, a few different discretization algorithms were used at data preprocessing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20