Search Results - (( knowledge identification modified algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation by Toha, Siti Fauziah, Abd Latiff, I., Mohamad, M., Tokhi, M Osman

    Published 2009
    “…Particle swarm optimization (PSO) is demonstrated as an efficient global search method for nonlinear complex systems without any a priory knowledge of the system structure. The proposed method formulates a modified inertia weight algorithm by using a dynamic spread factor (SF). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…By utilizing significant spectral contents of real patient data, a simulated signal can be reproduced any time and can be modified for the seizure and preseizure cases by utilizing the model coefficients identified through standard ARMA system identification technique. …”
    Get full text
    Get full text
    Article
  6. 6

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…By utilizing significant spectral con-tents of real patient data, a simulated signal can be reproduced any time and can be modified for the seizure and pre-seizure cases by utilizing the model coefficients identified through standard ARMA system identification technique. …”
    Get full text
    Get full text
    Citation Index Journal
  7. 7
  8. 8
  9. 9

    Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd... by Sharifah Nabilah , Syed Mohd Hamdan

    Published 2024
    “…Human identification is the main goal in anthropological and forensic investigations such as examination of ancient skeletons, investigations at criminal related scenes, or due to mass disasters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Robust techniques for linear regression with multicollinearity and outliers by Mohammed, Mohammed Abdulhussein

    Published 2016
    “…The proposed method is formulated by incorporating robust MM-estimator and the modified generalized M-estimator (MGM) in the LRR algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
    Get full text
    Get full text
    Get full text
    Thesis