Search Results - (( java implication _ algorithm ) OR ( knowledge utilization between algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing generality of meta-heuristic algorithms through adaptive selection and hybridization by Kamal Z., Zamli

    Published 2018
    “…Solving complex optimization problems can be painstakingly difficult endeavor considering multiple and conflicting design goals. A growing trend in utilizing meta-heuristic algorithms to solve these problems has been observed as they have shown considerable success in dealing with tradeoffs between conflicting design goals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…The process of building the machining data knowledge (training) was successfully achieved. A Comparison between the learned target machining data and data from MDH shows a low percentage of error. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Biologically inspired network on chip fault tolerant algorithm using time division multiplexing by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…With the help of TDM, multiple connections are possible between multiple sources and multiple destinations, which efficiently utilize the NoC bandwidth between PEs. …”
    Get full text
    Get full text
    Article
  12. 12

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…By using the proposed algorithm, the sparse coefficients are learned by exploiting the relationships among different multi-view features and leveraging the knowledge from multiple related tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Twisted pair cable fault diagnosis via random forest machine learning by Ghazali, N. B., Seman, F. C., Isa, K., Ramli, K. N., Z. Abidin, Z., Mustam, S. M., Haek, Haek, Z. Abidin, A. N., Asrokin, A.

    Published 2022
    “…Secondly, the feature transformation, a knowledge-based method, is utilized to pre-process the fault data. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modeling a problem solving approach through computational thinking for teaching programming / Zebel Al Tareq by Zebel , Al Tareq

    Published 2021
    “…Sorting algorithm as a concept for solving problems have been utilized to understand the effectiveness of the model in different teaching methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Automatic design, optimization and In-Situ Fabrication of Heterogeneous Swarm Robot bodies using 3-D printing and multi-objective evolutionary algorithms by Teo, Jason Tze Wi, Johnny Koh, Chin, Kim On, Chua, Bih Lii, Willey Liew, Noor Ajian Mohd. Lair, Lim, Shun Hoe

    Published 2012
    “…However, the vast majority of mobile robots are manually designed where the designers must have the preliminary knowledge of the interaction between the robots and the environment. …”
    Get full text
    Get full text
    Research Report
  18. 18

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm by Abu, Md Sahrom

    Published 2021
    “…Many organisation has taken an initiative to utilize Cyber Threat Intelligence (CTI) in their security posture in attributing cyberattack effectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis