Search Results - (( using combination using algorithm ) OR ( based replication method algorithm ))

Refine Results
  1. 1

    Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm by Kasim Hawari, Mohd Zarifitri

    Published 2023
    “…The environment design for mobile robots' path planning based on industry environment shows excellent combinations with the GA method that generate the optimal path for the mobile robot with a semi-dynamic obstacle.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A framework for automatic modelling of survival using fuzzy inference. by Hamdan, Hazlina, Garibaldi, Jonathan M.

    Published 2012
    “…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The system will generate an output where every detected face will be indicated with a rectangle on a copy of the original image. The method used for detecting face is a combination of color based technique and template matching. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The significance of the parallel deep learning architectures, combined with an RGB-image-based malware dataset and enhanced hyperparameter tuning, lies in their ability to detect obfuscated malware. …”
    thesis::doctoral thesis
  7. 7

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…A dynamic replication model based on mathematical concepts is proposed. …”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…This indicates that the model can be generalized and replicated in different regions and the proposed method can be applied in various landslides studies. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…In order to achieve this objective, each node must be connected in its shortest way as possible. We start our algorithm by designing shortest path algorithm based on Dijkstra's method. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Brain tumor quantification equation: modeled on complete step response algorithm by Aboaba, Abdulfattah A., Hameed, Shihab A., Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Harun, Rahmat, Zain, Norzaini Rose Mohd

    Published 2012
    “…What is presented here is a novel brain tumor quantification method based on step response algorithm utilizing a model which itself was based on step response model resulting in smart and rapid quantification of brain tumor volume.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Routing problem in rectangular mesh network using Dijkstra’s based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2018
    “…This paper presents a complete routing algorithm which can further refine the solution by using Dijkstra’s based greedy method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    To study the performance of stemming algorithm on Malay words beginning with the letter "S" / Rohana Jantan by Jantan, Rohana

    Published 2000
    “…This algorithm is used in the Malay language document that is used is the Quran translated document. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Experimental Study Of Combinational Logic Circuit Minimization Using Firefly Algorithm by Aznilnda, Zainodin, Aida Khairunisa, Ab. Kadir, M. Nasir, Ayob, Ahmad Fariz, Hasan, Amar Faiz, Zainal Abidin, Fazlinashatul Suhaidah, Zahid, Hazriq Izuan, Jafar, Ismail, Mohd Khairuddin

    Published 2014
    “…Combinatorial logic circuit minimization is usualy done using Karnaugh’s Map or Bolean equation. This paper presents an aplication of Firefly Algorithm to design combinational logic circuit in which the objective function is to minimize the total number of gates used. …”
    Get full text
    Get full text
    Article
  17. 17

    Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus by Mohd Yunus, Mohd Zawawi

    Published 2000
    “…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
    Get full text
    Get full text
    Thesis
  18. 18

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…Additionally, the Wilcoxon rank test was used to perform the significance analysis between the proposed SCSOKNN method and six other algorithms for a p-value less than 5.00E-02. …”
    Get full text
    Get full text
    Article
  20. 20

    To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail by Ismail, Norasiah

    Published 2001
    “…This involves the use of two combinations simultaneously such as the pair combination of prefix-suffix-prefix suffix-infix as primary combinations and prefix suffix-suffix-prefix-infix as the secondary. …”
    Get full text
    Get full text
    Thesis