Search Results - (( knowledge reading process algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Automation of Quranic Readings Gathering Process by AbuSafiya, Majed

    Published 2021
    “…In this paper, this process was algorithmically formulated and a developed software system was presented to automate this process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Multiple case-based retrieval for university course timetabling problem by Hong, Siaw Theng

    Published 2016
    “…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. The algorithm is combining separated distinct processes, with the combination of different functionalities: Prioritized Attributes, Frequency Grouping, and Value Difference Measurement. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation by Yousfi, Bilal, Zeki, Akram M.

    Published 2017
    “…In the process of learning Quran, reciters should have the provisions of Tajweed rules when reading the Quran. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin by Kamaruddin, Zunnajah

    Published 2005
    “…Therefore, it is needed to be read properly so the meaning of the reading is correct. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performance analysis of bacterial genome assemblers using illumina next generation sequencing data / Nur ‘ Ain Mohd Ishak by Nur ‘ Ain , Mohd Ishak

    Published 2020
    “…De Bruijn graph is one of the assembly algorithms that are widely used for short reads sequences produced from NGS platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A study on matrix factorization and its applications by Tang, Adrian Wen Kai

    Published 2021
    “…In order to carry out the project, we first read intensively on other research papers to increase the knowledge related to SVD and NMF. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Diagnostic And Classification System For Kids With Learning Disabilities by Rehman, Ullah Khan, Julia Ai Cheng, Lee, Yin, Bee Oon

    Published 2017
    “…Most experts are using manual techniques to diagnose dyslexia. Machine learning algorithms are capable enough to learn the knowledge of experts and thus, automation of the diagnosis process is possible. …”
    Get full text
    Get full text
    Proceeding
  10. 10

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Another downside is test results being subject to change with experts knowledge and years of experience. These factors lead to low accuracy and it becomes a lengthy process due to large number of images. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    A hybrid approach to improve recommendation system in E-tourism by Rahman M.M., Zaki Z.B.M., Alwi N.H.B.M., Monirul Islam M.

    Published 2024
    conference output::conference proceedings::conference paper
  12. 12

    Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control by Eshtawie, Mohamed Al-Mahdi

    Published 1999
    “…The navigation algorithm is proposed for static obstacles and with no priori knowledge about the environment. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb by Riyaz Ahamed , Ariyaluran Habeeb

    Published 2019
    “…The BroIDS processes the existing datasets and generates various log files such as HTTP which is used in this research while Flume component reads and tracks the incoming packet data blocks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…Furthermore, these techniques also do not consider the correlation between data during the fragmentation process. The knowledge about data correlation can be extracted from historical data using techniques of the data mining field. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Power consumption and size minimization of a wireless sensor node in automation system application by Sabry, Ahmad H., Wan Hasan, Wan Zuha, Ab Kadir, Mohd Zainal Abidin, Mohd Radzi, Mohd Amran, Shafie, Suhaidi

    Published 2015
    “…Starting from a MATLAB programming language code, we develop algorithms and node configuration in such a way that the analogue sensor signal, the processing and analysis area accomplished without using microcontroller, but only the XBee RF modules with 1+0.3 mWatt power consumption. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
    Get full text
    Get full text
    Get full text
    Thesis