Search Results - (( knowledge normalization techniques algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- normalization techniques »
- knowledge normalization »
- customization algorithm »
- java application »
-
1
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
Get full text
Get full text
Thesis -
2
Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm
Published 2019“…Besides that, the use of the prior knowledge input neural network (PKI-ANN) and the prior knowledge input difference neural network (PKID-ANN) for the modeling of high dimensional SI problem is proposed. …”
Get full text
Get full text
Thesis -
3
Bleeding classification of enhanced wireless capsule endoscopy images using deep convolutional neural network
Published 2020“…This paper investigates the performance of a Deep Convolutional Neural Network (DCNN) algorithm to identify bleeding areas of wireless capsule endoscopy (WCE) images without known prior knowledge of bleeding and normal features of the images. …”
Get full text
Get full text
Get full text
Article -
4
Optimization of neural network architecture using genetic algorithm for load forecasting
Published 2014“…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
Get full text
Get full text
Conference or Workshop Item -
5
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
Get full text
Get full text
Article -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…But all the clustering tool available are not suitable enough for a normal people that does not have expert knowledge in this field. …”
Get full text
Get full text
Thesis -
7
An initial state of design and development of intelligent knowledge discovery system for stock exchange database
Published 2004“…Data mining is a challenging matter in research field for the last few years.Researchers are using different techniques in data mining.This paper discussed the initial state of Design and Development Intelligent Knowledge Discovery System for Stock Exchange (SE) Databases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
Get full text
Get full text
Citation Index Journal -
9
Cognitive knowledge-based model for adaptive feedback: A case in physics / Andrew Thomas Bimba
Published 2019“…This form of representation is achieved through the knowledge elicitation, knowledge bonding, and adaptive feedback algorithms. …”
Get full text
Get full text
Get full text
Thesis -
10
Improving the evaluation performance of space-time trellis code through visualisation
Published 2011“…By comparing it with the enhancement strategy that was discovered via the normal approach (i.e., by analysing algorithm) it was discovered that visualisation had inspired an entirely different pruning technique that outperformed the common approach by 20%. …”
Get full text
Get full text
Conference or Workshop Item -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
The development of level of detail (LOD) technique in 3D computer graphics application
Published 2009“…In this thesis, out-of-core simplification algorithm is introduced to overcome the limitation of conventional technique. …”
Get full text
Get full text
Monograph -
13
What, how and when to use knowledge in neural network application
Published 2004“…; and When to use this knowledge? Knowledge is simply the weights that connect each neuron in neural networks. …”
Get full text
Get full text
Conference or Workshop Item -
14
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…In this thesis, out-ofcore simplification algorithm is introduced to overcome the limitation of conventional technique. …”
Get full text
Get full text
Thesis -
15
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The scale-up experiment showed that the proposed algorithm is more scalable than the other existing algorithms. …”
Get full text
Get full text
Thesis -
16
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…In this thesis, out-ofcore simplification algorithm is introduced to overcome the limitation of conventional technique. …”
Get full text
Get full text
Monograph -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Therefore, jammer attack detection and classification, studies were provided with better knowledge and technology to develop more robust defence techniques.…”
Get full text
Get full text
Thesis -
18
Agent-based extraction algorithm for computational problem solving
Published 2015“…Also, various models have been proposed for these techniques either using agent or non-agent based solutions, but the literature shows the existing models and techniques still have limitation for novice programmers as they need prior knowledge on programming language before being able to do CPS. …”
Get full text
Get full text
Thesis -
19
Improving the evaluation performance of space-time trellis code through STTC visualisation tool
Published 2013“…By comparing it with the enhancement strategy that was discovered via the normal approach (i.e., by analysing algorithm) it was discovered that visualisation had inspired an entirely different pruning technique that outperformed the common approach by 20%.…”
Get full text
Get full text
Get full text
Article -
20
An improved hybrid learning approach for better anomaly detection
Published 2011“…Anomaly detection is one of intrusion detection techniques. This technique identifies an activity which deviates from the normal behaviours. …”
Get full text
Get full text
Thesis
