Search Results - (( knowledge implementation phase algorithm ) OR ( java location based algorithm ))
Search alternatives:
- knowledge implementation »
- implementation phase »
- phase algorithm »
- java »
-
1
-
2
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…The research methodology encompasses preliminary study, design and implementation, and evaluation phases. Literature review, knowledge acquisition, and dataset collection inform algorithm selection and dataset validation. …”
Get full text
Get full text
Thesis -
6
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…The implementation phase are done by developing the project based on the Python language and also the gensim package tool that are available for use. …”
Get full text
Get full text
Thesis -
7
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…These phases are Requirement Gathering and Analysis Phase, Design Phase, and Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
8
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…These phases are Requirement Gathering and Analysis Phase, Design Phase, and Implementation Phase. …”
Get full text
Get full text
Get full text
Book Section -
9
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…DuriO Methodology has five phases namely, determine scope, webpages analysis, reuse knowledge model, implementation and validation phases. …”
Get full text
Get full text
Thesis -
10
-
11
Sliding mode controller optimization-based three-phase rectifier: review study
Published 2024“…This paper is vital for engineers, researchers, and experts focusing on the SMC of three-phase rectifiers. To our knowledge, no similar review of three-phase rectifiers is available for SMC. …”
Get full text
Get full text
Get full text
Article -
12
Logic Mining Approach: Shoppers’ Purchasing Data Extraction via Evolutionary Algorithm
Published 2023“…In reducing the learning complexity, a genetic algorithm was implemented to optimize the logical rule throughout the learning phase in performing a 2-satisfiability-based reverse analysis method, implemented during the learning phase as this method was compared. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Segmenting microcalcifications using enhanced distance active contour (EDAC) / Siti Salmah Yasiran
Published 2010“…There are four major phases employed in this study. The first phase is the knowledge and data acquisition. …”
Get full text
Get full text
Thesis -
14
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
Get full text
Get full text
Thesis -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Implementation of case-based reasoning in help desk system
Published 2019“…The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. To achieve this aim, CBR algorithm will be studied and implemented in the help desk system to assist the travel agent provide recommendation to customers on selecting the hotel to stay based on customers’ requirements. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
A case study on quality of sleep and health using Bayesian networks
Published 2012“…A structural learning is conducted on the data to learn the correct network structure. There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
Get full text
Article -
19
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Soft computing technique is used for information processing by employing methods, which are capable to deal with imprecision and uncertainty issues. By implementing soft computing techniques in data mining especially in HR field can enhance the knowledge discovery process for intelligent decision system. …”
Get full text
Get full text
Research Reports -
20
Synergizing intelligence and knowledge discovery: Hybrid black hole algorithm for optimizing discrete Hopfield neural network with negative based systematic satisfiability
Published 2024“…Additionally, a Hybrid Black Hole Algorithm was proposed in the retrieval phase to optimize the final neuron states. …”
Get full text
Get full text
Get full text
Article
