Search Results - (( knowledge implementation 5s algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- knowledge implementation »
- customization algorithm »
- implementation 5s »
- java application »
- 5s algorithm »
-
1
-
2
-
3
-
4
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
Get full text
Conference or Workshop Item -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
The effect of total bits and number of LFSRs on the hardware performance of modified A5/1 stream ciphers
Published 2024journal::journal article -
8
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
9
Dual-head marking performance optimisation via evolutionary solutions
Published 2023Conference paper -
10
-
11
-
12
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
13
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
Published 2024Get full text
journal::journal article -
14
-
15
An adaptive neuro-fuzzy inference system employed cuk converter for PV applications
Published 2023Conference Paper -
16
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This project is developed by using Waterfall Model methodology as it’s the most direct model that is suitable for developing a system which consist of 5 phases which are Requirement Analysis, Design, Implementation, Testing and Maintenance. …”
Get full text
Get full text
Thesis -
17
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…Viola-Jones algorithm is utilized for face detection. Upon acquiring the face location, the knowledge-based method is implemented to locate the eye and the mouth. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021“…Green building is known as a potential method to improve building performance efficiency. To our knowledge, there is still no implementation of machine learning models on green building valuation features for building price prediction compared to conventional building development. …”
Get full text
Get full text
Conference or Workshop Item -
19
Feasibility study concerning the use of reasoning technique in semantic reasoners
Published 2014Get full text
Conference or Workshop Item -
20
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…In this work, two AP selection algorithms are proposed which are Max Kernel and Kernel Logistic Discriminant that implement the knowledge of kernel density estimate and logistic regression machine learning classification. …”
Get full text
Get full text
Thesis
