Search Results - (( system implementation developing algorithm ) OR ( framework implementation mining algorithm ))

Refine Results
  1. 1

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
    Article
  2. 2
  3. 3

    Dynamic investment model for the restructed power market in the presence of wind source by Esfahani, Mohammad Tolou Askari Sedehi

    Published 2014
    “…The proposed framework has been implemented in the hypothetical restructured power market using the IEEE Reliability Test System. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The experimental results show that the proposed feature selection framework performed better when compared to other state-of-the-art feature selection algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A framework for malware identification based on behavior by Mohamad Fadli, Zolkipli

    Published 2012
    “…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…The development of the algorithm starts by reviewing the characteristic of an autonomous systems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman by Mohd Kamaruzaman, Amizah

    Published 2012
    “…This project followed the System Development Life Cycle (SDLC) model for the developing of the system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
    Get full text
    Get full text
    Article
  14. 14

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Design and development of sensor based traffic light system by Albagul, Abdulgani, Hrairi, Meftah, Wahyudi, Martono, Hidayathullah, M. F.

    Published 2006
    “…Hardware simulation tests were successfully performed on the algorithm implemented into a controller. The new timing scheme that was implemented promises an improvement in the current traffic light system and this system is feasible, affordable and ready to be implemented especially during peak hours. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    CAR TRACTION CONTROL SYSTEM by MOHD ISMAIL, ADIBAH

    Published 2007
    “…This project explores the potential of implementing fuzzy logic algorithm for traction control system using VHDL. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis