Search Results - (( java implication based algorithm ) OR ( knowledge integration under algorithm ))

Refine Results
  1. 1
  2. 2

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The BayesNet provides the best integrated MLADR fault classifier model better at a 5 % significance level than other deployed algorithms in the intelligent supervised learning model realization. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Deriving global and local integrity rules for a distributed database by Ibrahim, Hamidah

    Published 2001
    “…An important aim of a database system is to guarantee database consistency, which means that the data contained in a database is both accurate and valid. Integrity constraints represent knowledge about data with which a database must be consistent. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section
  7. 7

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8

    DC-link capacitor voltage regulation with effort-reduction fuzzy logic control for three-level inverter-based shunt active power filter by Mailah, Nashiren Farzilah, Yap, Hoon, Mohd Radzi, Mohd Amran

    Published 2017
    “…However, PI technique performs poorly with high overshoot and significant time delay under dynamic state conditions, as its parameters are difficult to be tuned without requiring complete knowledge of the designated system. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching by Esmaeili Motlagh, Omid Reza

    Published 2006
    “…While the fuzzy logic body of the algorithm performs the main tasks of obstacle avoidance, target seeking, and speed adjustment, an actual-virtual target switch strategy integrated with the fuzzy logic algorithm enables the robot to show wall following behavior when needed. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A Model Development And Comparison Study On The Microwave Remote Sensing Of Snow Medium Using A Coupled Finite Element Method And Method Of Moment, And The Relaxed Hierarchical Equ... by Hamsalekha, Kumaresan

    Published 2022
    “…The investigatio n is done by integrating two computational techniques, which are the coupled Finite Element Method (FEM) and Method of Moment (MoM) and the Relaxed Hierarchical Equivalent Source Algorithm (RHESA). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa by Syed Mustaffa, Sharifah Azma

    Published 2020
    “…The element of chaotic local search is also integrated into the algorithm for better performance. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Online optimal tuning of fuzzy PID controller using grey wolf optimizer for quarter car semi-active suspension system by Liu, Yunyun, As’arry, Azizan, Ahmed, Hesham, Hairuddin, Abdul Aziz, Hassan, Mohd Khair, Zakaria, Mohd Zakimi, Yang, Shuai

    Published 2024
    “…Here the magnetorheological damper (MR) fluid with the Fuzzy PID controller was examined to optimize using the GWO algorithm. With the GWO technique and the integral of time absolute error (IAE) as a fitness function, the three gain parameters of the Fuzzy PID controller – Kp, Ki, and Kd– have been optimally set. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024) by Ibrahim Brian, Muhammad Shyazzwan

    Published 2025
    “…These include limited teacher preparedness, ethical concerns such as data privacy and algorithmic bias, and a lack of research into the long-term, scalable use of AI, particularly in under-resourced or marginalized educational contexts. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The system is designed in such a way to integrate these two types of motion factors using causal inference mechanism of the fuzzy cognitive map (FCM). …”
    Get full text
    Get full text
    Thesis
  20. 20