Search Results - (( process validating site algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…Thus, the first phase is to develop a criteria scheme data for potential Renewable Energy Sources (RES) sites. It is followed by identifying RES sites using spatial data and Multi-Criteria Decision Making-Analytical Hierarchy Process (MCDM-AHP) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Validation against conventional methods and state-of-the-art algorithms confirmed the superior performance of the proposed approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement by Ab Jabal, Mohamad Faizal, Rozlan, Muhammad Irfan, Suhaimi, Azrina, Hasmy, Harshida

    Published 2025
    “…Future work will emphasise empirical validation and the deployment of the YOLOv7 model for real-time, on-site assessment of fruit maturity in field conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…Indexing weblogs use the links to retrieve the blogs sites for text processing and construct indexing database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Computer Aided Design of Polygalacturonase II from aspergillus niger by Noorbatcha, Ibrahim Ali, Ismail, Nur Izzah, Mohd. Salleh, Hamzah

    Published 2011
    “…Lamarckian genetic algorithm is used for automated docking and the active site is validated by comparing with existing experimental data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…The algorithm's validity was proven by applying it to a simple material handling process which is a colour sorting conveyor. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Computer Aided Design of Polygalacturonase II from Aspergillus niger by Noorbatcha, Ibrahim Ali, Ismail, Nur Izzah, Mohd. Salleh, Hamzah

    Published 2011
    “…Lamarckian genetic algorithm is used for automated docking andthe active site is validated by comparing with existing experimental data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Newly constructed database may no longer be valid if there are any major changes in the target site. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Outdoor User Location over 802.11 Ad-hoc Network by Roslan, Mohd Azrik

    Published 2006
    “…At the end of this work, the site testing has validated that this algorithm can be used to determine the user location in outdoor environment with considerable accuracy.…”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…An appropriate siting of landfill sites will protect both environment and public health. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Deriving global and local integrity rules for a distributed database by Ibrahim, Hamidah

    Published 2001
    “…In this paper, we describe an enforcement algorithm based on the rule mechanisms for a distributed database which aims at minimising the amount of data that has to be accessed or transferred across the underlying network by maintaining the consistency of the database at a single site, i.e. at the site where the update is to be performed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The performance of the outcome was validated based on the receiver operating characteristic (ROC) area under the curve (AUC) values, confusion matrix and Cross Validation method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A comparative effectiveness of hierarchical and non-hierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions by Chuan, Zun Liang, Wan Nur Syahidah, Wan Yusoff, Azlyna, Senawi, Mohd Akramin, Mohd Romlay, Fam, Soo-Fen, Wendy Ling, Shinyie, Tan Lit, Ken

    Published 2022
    “…However, previous studies employed regionalisation algorithms, namely agglomerative hierarchical and non-hierarchical regionalisation algorithms requiring post-processing techniques to validate and interpret the analysis results. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A comparative effectiveness of hierarchical and nonhierarchical regionalisation algorithms in regionalising the homogeneous rainfall regions by Zun, Liang Chuan, Wan Yusof, Wan Nur Syahidah, Senawi, Azlyna, Mohd Akramin, Mohd Romlay, Soo, Fen Fam, Wendy, Ling Shinyie, Tan, Lit Ken

    Published 2022
    “…However, previous studies employed regionalisation algorithms, namely agglomerative hierarchical and non-hierarchical regionalisation algorithms requiring post-processing techniques to validate and interpret the analysis results. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Classification of Emphysema Patterns in Computed Tomography Based On Gabor Filter by Tengku Azis, Tengku Mohd Syamim

    Published 2015
    “…The proposed emphysema classification algorithm involves four aspects, image pre-processing, feature extraction, matching (classification), and decision making. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Assessment of suitable hospital location using GIS and machine learning by Almansi, Khaled Y. M.

    Published 2022
    “…First, the conditioning factors were optimized and ranked to identify and select the most correlated factors to predict the suitability of a hospital site by applying the correlation feature selection (CFS) algorithm and the greedy-stepwise search method. …”
    Get full text
    Get full text
    Thesis