Search Results - (( knowledge preservation methods algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss by Idriss Moussa , Idriss

    Published 2021
    “…The proposed combined method has achieved good deblurring with edge-preserving results based on the evaluation metrics used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Ball surface representations using partial differential equations by Kherd, Ahmad Saleh Abdullah

    Published 2015
    “…This algorithm is then tested in positivity preserving of surface and image enlargement problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Out-of-core simplification with appearance preservation for computer game applications by Tan, Kim Heok

    Published 2006
    “…Unlike any other vertex clustering methods, the knowledge of neighbourhood between nodes is unnecessary and the node simplification is performed independently. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Out-of-core simplification with appearance preservation for computer game applications by Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal, Tan , Kim Heok

    Published 2006
    “…Unlike any other vertex clustering methods, the knowledge of neighbourhood between nodes is unnecessary and the node simplification is performed independently. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The evaluation results show that the proposed approach outperforms the algorithms of other recognition methods used for comparison. …”
    Get full text
    Get full text
    Thesis
  6. 6

    MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System by AL-Khaleefa, Ahmed Salih, Mohd Riduan, Ahmad, Awang Md Isa, Azmi, AL-Saffar, Ahmed, Mohd Esa, Mona Riza, Malik, Reza Firsandaya

    Published 2019
    “…The most difficult aspect of techniques based on fingerprints is the effect of dynamic environmental changes on fingerprint authentication.With the aim of dealing with this problem, many experts have adopted transfer-learning methods even though in WiFi indoor localization the dynamic quality of the change in the fingerprint has some cyclic factors that necessitate the use of previous knowledge in various situations. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…Protein sequence annotation is important for the preservation and reuse of knowledge, for content-based queries, and for the understanding of its function. …”
    Get full text
    Get full text
    Monograph
  9. 9

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Personalized one-shot local adaptation federated learning for mortality prediction in multi-center Intensive Care Unit by Deng, Ting

    Published 2024
    “…Unlike traditional data-centralized ML methods, federated learning (FL) provides a novel and promising distributed learning scheme to promote ML in multiple healthcare institutions while preserving data privacy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    MFA-OSELM algorithm for WiFi-based indoor positioning system by Al-Khaleefa, Ahmed Salih, Mohd Riduan, Ahmad, Azmi Awang, Md Isa, Al-Saffar, Ahmed Ali Mohammed, Mona Riza, Mohd Esa, Reza Firsandaya, Malik

    Published 2019
    “…With the aim of dealing with this problem, many experts have adopted transfer-learning methods, even though in WiFi indoor localization the dynamic quality of the change in the fingerprint has some cyclic factors that necessitate the use of previous knowledge in various situations. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir

    Published 2016
    “…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation by Toha, Siti Fauziah, Abd Latiff, I., Mohamad, M., Tokhi, M Osman

    Published 2009
    “…The proposed method formulates a modified inertia weight algorithm by using a dynamic spread factor (SF). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    An improved genetic-fuzzy system for classification and data analysis by Lahsasna, A., Seng, W.C.

    Published 2017
    “…In the second variant classifier, we further improve the first variant classifier by enhancing the selection method of the antecedent conditions of the rules generated in the initial population of genetic algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    A semantic conceptualization on tagged bag-of concepts to improve accuracy for sentiment Analysis by Mehanna, Yassin Samir Hassan

    Published 2023
    “…Thus, contributing knowledge in SA and into the lexicon-based and hybrid approaches.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An interpretable fuzzy-ensemble method for classification and data analysis / Adel Lahsasna by Adel, Lahsasna

    Published 2016
    “…In addition, the fuzzy-ensemble method has successfully preserved its interpretability compared to the fuzzy rule-based system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    The development of level of detail (LOD) technique in 3D computer graphics application by Ismail, Nor Anita Fairos, Daman, Daut, Mohd. Rahim, Mohd. Shafry

    Published 2009
    “…Unlike any other vertex clustering methods, the knowledge of neighbourhood between nodes is unnecessary and the node simplification is performed independently. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir by Md Nasir, Syerina Azlin

    Published 2016
    “…A compromised method is needed to balance between the construction efficiency and the knowledge loss. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…This algorithm encode a potential solution to a specific problem on a simple chromosome like data structure and apply recombination operators to this structure to preserve critical information. …”
    Get full text
    Thesis