Search Results - (( java implementation during algorithm ) OR ( knowledge implementation phase algorithm ))
Search alternatives:
- knowledge implementation »
- implementation during »
- implementation phase »
- java implementation »
- during algorithm »
- phase algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
3
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…The research methodology encompasses preliminary study, design and implementation, and evaluation phases. Literature review, knowledge acquisition, and dataset collection inform algorithm selection and dataset validation. …”
Get full text
Get full text
Thesis -
4
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…The implementation phase are done by developing the project based on the Python language and also the gensim package tool that are available for use. …”
Get full text
Get full text
Thesis -
5
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…These phases are Requirement Gathering and Analysis Phase, Design Phase, and Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
6
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…These phases are Requirement Gathering and Analysis Phase, Design Phase, and Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
7
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…DuriO Methodology has five phases namely, determine scope, webpages analysis, reuse knowledge model, implementation and validation phases. …”
Get full text
Get full text
Thesis -
8
Sliding mode controller optimization-based three-phase rectifier: review study
Published 2024“…This paper is vital for engineers, researchers, and experts focusing on the SMC of three-phase rectifiers. To our knowledge, no similar review of three-phase rectifiers is available for SMC. …”
Get full text
Get full text
Get full text
Article -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
10
Logic Mining Approach: Shoppers’ Purchasing Data Extraction via Evolutionary Algorithm
Published 2023“…In reducing the learning complexity, a genetic algorithm was implemented to optimize the logical rule throughout the learning phase in performing a 2-satisfiability-based reverse analysis method, implemented during the learning phase as this method was compared. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Segmenting microcalcifications using enhanced distance active contour (EDAC) / Siti Salmah Yasiran
Published 2010“…There are four major phases employed in this study. The first phase is the knowledge and data acquisition. …”
Get full text
Get full text
Thesis -
12
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
Get full text
Get full text
Thesis -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Implementation of case-based reasoning in help desk system
Published 2019“…The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. To achieve this aim, CBR algorithm will be studied and implemented in the help desk system to assist the travel agent provide recommendation to customers on selecting the hotel to stay based on customers’ requirements. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
17
A case study on quality of sleep and health using Bayesian networks
Published 2012“…A structural learning is conducted on the data to learn the correct network structure. There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
Get full text
Article -
18
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Soft computing technique is used for information processing by employing methods, which are capable to deal with imprecision and uncertainty issues. By implementing soft computing techniques in data mining especially in HR field can enhance the knowledge discovery process for intelligent decision system. …”
Get full text
Get full text
Research Reports -
19
Synergizing intelligence and knowledge discovery: Hybrid black hole algorithm for optimizing discrete Hopfield neural network with negative based systematic satisfiability
Published 2024“…Additionally, a Hybrid Black Hole Algorithm was proposed in the retrieval phase to optimize the final neuron states. …”
Get full text
Get full text
Get full text
Article -
20
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis
