Search Results - (( java implication force algorithm ) OR ( knowledge implementation success algorithm ))
Search alternatives:
- knowledge implementation »
- implication force »
- java implication »
- force algorithm »
-
1
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
2
Assessing the outcome of Competencies Level from Knowledge-Based Project
Published 2008“…This project is the new idea to implement the Knowledge Management by applying the concept of Knowledge Map and Social Network Map, which are the basic implementation of Knowledge Management, with Artificial Neural Network (ANN) Algorithm ofArtificial Intelligence System. …”
Get full text
Get full text
Final Year Project -
3
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
Get full text
Get full text
Thesis -
4
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
Get full text
Get full text
Thesis -
5
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…This algorithm has been tested and implemented successfully via a dual beam optical scanning system.…”
Get full text
Get full text
Thesis -
6
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
7
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…Bayesian networks have been successfully implemented as classi¯ers in many research and industrial areas and they are used as models for representing un- certainty in knowledge domains. …”
Get full text
Get full text
Thesis -
8
-
9
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…The implemented algorithm to perform such operation was far more efficient, faster and accurate as compared to conventional methods. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Segmenting microcalcifications using enhanced distance active contour (EDAC) / Siti Salmah Yasiran
Published 2010“…Results obtained show that the EDAC has successfully reduced the processing time. In addition to that, the boundaries of microcalcifications have been successfully segmented by the EDAC. …”
Get full text
Get full text
Thesis -
11
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2006“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. © 2006 Asian Network for Scientific Information.…”
Get full text
Get full text
Get full text
Article -
12
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. � 2006 Asian Network for Scientific Information.…”
Article -
13
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. � 2006 Asian Network for Scientific Information.…”
Article -
14
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
Get full text
Get full text
Get full text
Thesis -
15
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section -
16
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section -
17
Test case minimization applying firefly algorithm
Published 2018Get full text
Get full text
Get full text
Article -
18
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article -
19
Retrieval based on skin color to detect the malicious images
Published 2009“…Unfortunately, it is far beyond our knowledge. There still a lot of current algorithms are quite successful in using low-level features of the images such as color histogram and texture. …”
Get full text
Get full text
Get full text
Research Report -
20
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article
