Search Results - (( probable distributed database algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Fault section detection and location on distribution network using analytical voltage sags database by Khalid, A.R., Mokhlis, Hazlie, Li, H.

    Published 2006
    “…Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Statistical selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun

    Published 2008
    “…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improvement and performance analysis on statistical selection algorithms by Kweh, Yeah Lun, Othman, Mohamed

    Published 2006
    “…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7

    Malay continuous speech recognition using continuous density hidden Markov model by Ting, Chee Ming

    Published 2007
    “…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Population genetic structure of Malayan Tapir (Tapirus indicus Desmarest) in Peninsular Malaysia by Lim, Qi Luan

    Published 2019
    “…Using K-means clustering algorithm, five clusters were inferred among the wild samples (N = 57), which showed a complex population structure probably comprising multiple continuous populations that also experiencing considerably restricted gene flow due to isolation by geographical barriers especially mountain ranges. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…That malicious file most probably is a Trojan that capable to steal confidential information from victim’s computer. …”
    Get full text
    Get full text
    Thesis