Search Results - (( java implication based algorithm ) OR ( knowledge integration under algorithm ))
Search alternatives:
- knowledge integration »
- implication based »
- integration under »
- java implication »
- under algorithm »
-
1
-
2
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The BayesNet provides the best integrated MLADR fault classifier model better at a 5 % significance level than other deployed algorithms in the intelligent supervised learning model realization. …”
Get full text
Get full text
Thesis -
3
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
Get full text
Get full text
Thesis -
4
Deriving global and local integrity rules for a distributed database
Published 2001“…An important aim of a database system is to guarantee database consistency, which means that the data contained in a database is both accurate and valid. Integrity constraints represent knowledge about data with which a database must be consistent. …”
Get full text
Get full text
Get full text
Article -
5
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
6
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section -
7
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section -
8
DC-link capacitor voltage regulation with effort-reduction fuzzy logic control for three-level inverter-based shunt active power filter
Published 2017“…However, PI technique performs poorly with high overshoot and significant time delay under dynamic state conditions, as its parameters are difficult to be tuned without requiring complete knowledge of the designated system. …”
Get full text
Get full text
Get full text
Article -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching
Published 2006“…While the fuzzy logic body of the algorithm performs the main tasks of obstacle avoidance, target seeking, and speed adjustment, an actual-virtual target switch strategy integrated with the fuzzy logic algorithm enables the robot to show wall following behavior when needed. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
A Model Development And Comparison Study On The Microwave Remote Sensing Of Snow Medium Using A Coupled Finite Element Method And Method Of Moment, And The Relaxed Hierarchical Equ...
Published 2022“…The investigatio n is done by integrating two computational techniques, which are the coupled Finite Element Method (FEM) and Method of Moment (MoM) and the Relaxed Hierarchical Equivalent Source Algorithm (RHESA). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa
Published 2020“…The element of chaotic local search is also integrated into the algorithm for better performance. …”
Get full text
Get full text
Thesis -
15
Online optimal tuning of fuzzy PID controller using grey wolf optimizer for quarter car semi-active suspension system
Published 2024“…Here the magnetorheological damper (MR) fluid with the Fuzzy PID controller was examined to optimize using the GWO algorithm. With the GWO technique and the integral of time absolute error (IAE) as a fitness function, the three gain parameters of the Fuzzy PID controller – Kp, Ki, and Kd– have been optimally set. …”
Get full text
Get full text
Get full text
Article -
16
Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024)
Published 2025“…These include limited teacher preparedness, ethical concerns such as data privacy and algorithmic bias, and a lack of research into the long-term, scalable use of AI, particularly in under-resourced or marginalized educational contexts. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Parameters of Artificial Intelligence (AI) in Fatwa Issuance: A Jurisprudential and Technological Ethics Analysis
Published 2026journal::journal article -
19
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The system is designed in such a way to integrate these two types of motion factors using causal inference mechanism of the fuzzy cognitive map (FCM). …”
Get full text
Get full text
Thesis -
20
