Search Results - (( java implementation phase algorithm ) OR ( basic representation _ algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman by Abd Rohaman, Muhammad Syurahbil

    Published 2020
    “…Basic Theta* is implemented in the game using grid-based map representation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…Traditional schema theory does not support Lamatckian learning, i.e, forcing the genetic representation to match the solution found by the learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…The problematic message uses light blue representation in simulation. The sent message uses the red color representation in the simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Simulation on Emotion Recognition for Autism Therapy by Adzmi, Muhammad Azrin

    Published 2017
    “…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. The program will be used by the therapist during therapy session with the autism child in order to create more exciting environment for them to learn about the classification of basic human emotions with the help of human-computer interaction. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim by Hashim, Hazwani

    Published 2014
    “…Here, specific transition matrix of FACS in CFB is developed and its basic properties which relates to Perron-Frobenius theorem are investigated. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling by Anuar, Nurul Izah

    Published 2022
    “…This research first proposes an improved continuous MOPSO to address the rapid clustering problem that exists in the basic PSO algorithm using three improvement strategies: re-initialization of particles, systematic switch of best solutions and mutation on global best selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…The genetic algorithm technique is explained and the real number representation of genetic algorithm is modeled. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Interval-valued fuzzy soft topology and its applications in group decision-making problems by Altwer, Mabruka Ali Juma

    Published 2022
    “…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
    Get full text
    Get full text
    Thesis
  13. 13

    B-Parts Of Real Numbers And Their Generalization by Hooshmand, Mohamad Hadi

    Published 2010
    “…(b) Application of b-parts for unique finite and infinite representation of real numbers, applying them and the generalized division algorithm, we not only introduce some direct formulas for digits of the unique infinite expansion of real numbers to the base an integer but also prove a (new) unique finite representation of real numbers to the base an arbitrary real number (not equal 0, ±1). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…We implement a branch-and-contract algorithm that aims at reducing the size of the search region. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    A fuzzy case-based reasoning model for software requirements specifications quality assessment by Mostafa S.A., Gunasekaran S.S., Khaleefah S.H., Mustapha A., Jubair M.A., Hassan M.H.

    Published 2023
    “…Additionally, for efficient cases retrieval in the CBR, relevant cases selection and nearest cases selection heuristic search algorithms are used in the system. Basically, the input to the relevant cases algorithm is the available cases in the system case base and the output is the relevant cases. …”
    Article
  16. 16

    A new modern scheme for solving fractal–fractional differential equations based on deep feedforward neural network with multiple hidden layer by Admon, Mohd Rashid, Senu, Norazak, Ahmadian, Ali, Majid, Zanariah Abdul, Salahshour, Soheil

    Published 2024
    “…During the initial stage of the method development, the basic framework on solving FFDEs is designed. To minimize the burden of computational time, the vectorized algorithm is constructed at the next stage for method to be performed efficiently. …”
    Get full text
    Get full text
    Article
  17. 17

    Design and Development of a Vision System Interface for Three Degree of Freedom Agricultural Robot by Omrane, Bouketir

    Published 1999
    “…The Lagrange-Euler formulation with the D-H representation was applied to formulate the differential system. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Feature-based approach and sequential pattern mining to enhance quality of Indonesian automatic text summarization by Maylawati, Dian Sa’adillah, Jaya Kumar, Yogan, Kasmin, Fauziah

    Published 2023
    “…Therefore, this research aims to enhance the quality of extractive Indonesian automatic text summarization with considering the quality of structured representation of text. This research uses sequential pattern mining (SPM) to produce This research use SPM to produce sequence of words (SoW) as structured text representation using PrefixSpan algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Malay continuous speech recognition using continuous density hidden Markov model by Ting, Chee Ming

    Published 2007
    “…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article