Search Results - (( knowledge based normalization algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…There are different techniques used in RS. Some works are based on user past knowledge known as Content Based (CB) while more popular techniques referred to as neighborhood models (CF and MF) are based on finding similar users for recommendation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…But all the clustering tool available are not suitable enough for a normal people that does not have expert knowledge in this field. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article
  6. 6

    Cognitive knowledge-based model for adaptive feedback: A case in physics / Andrew Thomas Bimba by Andrew Thomas, Bimba

    Published 2019
    “…The model uses the Cognitive Knowledge Base (CKB) to represent knowledge as a formal concept based on an Object-Attribute-Relation (OAR) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Citation Index Journal
  9. 9

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  11. 11

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…The aim of the study is to describe the general methodology that normally applies in any neural network based application. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining by H’ng, Choo Wooi

    Published 2019
    “…The recorded data were screened on data normalization while the outliers were discarded prior to regression analysis aided by the Waikato Environment for Knowledge Analysis (WEKA) tool. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Open architecture pc-based CNC controller by Yusoff, Wan Azhar

    Published 2006
    “…The developed CNC controller is an Open Architecture PC based type controller. Besides having all normal controller functions, the developed controller also permit upgradeable and interchangeable controller functions. …”
    Get full text
    Get full text
    Research Report
  20. 20

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…In the standard HS, the value of bandwidth (BW) parameter was static, while in this research, a dynamic set of bandwidth (BW2) value was formed based on constraints (problem domain). The BW2 value was dynamically changed and determined based on the current solution (with heuristic concept) of each driver every week, whereas the 2-opt swapping, which is normally used in travelling salesman problem, was applied for route constraint based on specific rules. …”
    Get full text
    Get full text
    Get full text
    Thesis