Search Results - (( knowledge utilization force algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- utilization force »
- java application »
- force algorithm »
-
1
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014“…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Intelligent adaptive active force control of a robotic arm with embedded iterative learning algorithms
Published 2001“…The paper highlights a novel and robust method to control a robotic arm using an iterative learning technique embedded in an active force control strategy. Two main iterative learning algorithms are utilized in the study – the first is used to automatically tune the controller gains while the second to estimate the inertia matrix of the manipulator. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive impedance control for unknown non-flat environment
Published 2013“…The force error feedback is utilized in the estimation and the accurate knowledge of the environment parameters are not required by the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Automated Model Generation Approach Using MATLAB
Published 2011“…The properties of the tuning algorithm were investigated by modelling a two-stage CMOS opamp, and comparing simulations of the macromodel against those of the original SPICE circuit utilizing transient analysis. …”
Get full text
Get full text
Get full text
Book Section -
6
Aligning Malaysian SMEs with the megatrends: the roles of HPWPs and employee creativity in enhancing Malaysian SME performance
Published 2018“…The partial least squares algorithm and the bootstrapping technique were used for data analysis. …”
Get full text
Get full text
Article -
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Numerical optimization of elevated thin reinforced concrete shell structures subjected to extreme loading / Azizah Abdul Nassir
Published 2023“…The research expands the current knowledge in this area, shedding light on the benefits of utilizing shell structures for extreme load support. …”
Get full text
Get full text
Thesis -
9
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…The proposed model mitigates the fade in heavy fading channels by utilizing zero-forcing beamforming (ZFBF) and semi-orthogonal user selection (SUS) techniques. …”
Get full text
Get full text
Thesis
