Search Results - (( knowledge normalization techniques algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm by Goay, Chan Hong

    Published 2019
    “…Besides that, the use of the prior knowledge input neural network (PKI-ANN) and the prior knowledge input difference neural network (PKID-ANN) for the modeling of high dimensional SI problem is proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Bleeding classification of enhanced wireless capsule endoscopy images using deep convolutional neural network by Rosdiana, Shahril, Saito, Atsushi, Shimizu, Akinobu, Sabariah, Baharun

    Published 2020
    “…This paper investigates the performance of a Deep Convolutional Neural Network (DCNN) algorithm to identify bleeding areas of wireless capsule endoscopy (WCE) images without known prior knowledge of bleeding and normal features of the images. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…But all the clustering tool available are not suitable enough for a normal people that does not have expert knowledge in this field. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…Data mining is a challenging matter in research field for the last few years.Researchers are using different techniques in data mining.This paper discussed the initial state of Design and Development Intelligent Knowledge Discovery System for Stock Exchange (SE) Databases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Citation Index Journal
  9. 9

    Cognitive knowledge-based model for adaptive feedback: A case in physics / Andrew Thomas Bimba by Andrew Thomas, Bimba

    Published 2019
    “…This form of representation is achieved through the knowledge elicitation, knowledge bonding, and adaptive feedback algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Improving the evaluation performance of space-time trellis code through visualisation by Harun, Harlisya, Ungku Chulan, Ungku Azmi Iskandar, Khazani, Khamizon

    Published 2011
    “…By comparing it with the enhancement strategy that was discovered via the normal approach (i.e., by analysing algorithm) it was discovered that visualisation had inspired an entirely different pruning technique that outperformed the common approach by 20%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    The development of level of detail (LOD) technique in 3D computer graphics application by Ismail, Nor Anita Fairos, Daman, Daut, Mohd. Rahim, Mohd. Shafry

    Published 2009
    “…In this thesis, out-of-core simplification algorithm is introduced to overcome the limitation of conventional technique. …”
    Get full text
    Get full text
    Monograph
  13. 13

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…; and When to use this knowledge? Knowledge is simply the weights that connect each neuron in neural networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Out-of-core simplification with appearance preservation for computer game applications by Tan, Kim Heok

    Published 2006
    “…In this thesis, out-ofcore simplification algorithm is introduced to overcome the limitation of conventional technique. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The scale-up experiment showed that the proposed algorithm is more scalable than the other existing algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Out-of-core simplification with appearance preservation for computer game applications by Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal, Tan , Kim Heok

    Published 2006
    “…In this thesis, out-ofcore simplification algorithm is introduced to overcome the limitation of conventional technique. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Therefore, jammer attack detection and classification, studies were provided with better knowledge and technology to develop more robust defence techniques.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Also, various models have been proposed for these techniques either using agent or non-agent based solutions, but the literature shows the existing models and techniques still have limitation for novice programmers as they need prior knowledge on programming language before being able to do CPS. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improving the evaluation performance of space-time trellis code through STTC visualisation tool by Harun, Harlisya, Ungku Chulan, Ungku Azmi Iskandar, Khazani, Khamizon

    Published 2013
    “…By comparing it with the enhancement strategy that was discovered via the normal approach (i.e., by analysing algorithm) it was discovered that visualisation had inspired an entirely different pruning technique that outperformed the common approach by 20%.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…Anomaly detection is one of intrusion detection techniques. This technique identifies an activity which deviates from the normal behaviours. …”
    Get full text
    Get full text
    Thesis