Search Results - (( using computational method algorithm ) OR ( using action method algorithm ))

Refine Results
  1. 1

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The threshold adaptation was achieved by using the mean value, the standard deviation, and the L1-norm instead of the comparison of user summaries evaluation method to obtain a fully automatic video summarisation algorithm, and by eliminating the conditions in selecting the final key frames to reduce the complexity of the algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    A Newton Cooperative Genetic Algorithm Method for In Silico Optimization of Metabolic Pathway Production by Mohd Arfian, Ismail, Safaai, Deris, Mohd Saberi, Mohamad, Afnizanfaizal, Abdullah

    Published 2015
    “…The NCGA used Newton method in dealing with the metabolic pathway, and then integrated genetic algorithm and cooperative co-evolutionary algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…As a conclusion, the student's reaction as they remain focused throughout the session shows that the use of algorithms and scratch programs is better than conventional methods in teaching the Malay Language…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…As a conclusion, the student's reaction as they remain focused throughout the session shows that the use of algorithms and scratch programs is better than conventional methods in teaching the Malay Language.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Motion target detection and tracking are among the most important computer vision areas that use advanced image processing techniques. …”
    Get full text
    Get full text
    Article
  7. 7

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Newton competitive genetic algorithm method for optimization the production of biochemical systems by Mohd Arfian, Ismail, Kirahman, Ab Razak, Kohbalan, Moorthy, Mezhuyev, Vitaliy, Shahreen, Kasim, Ashraf Osman, Ibrahim

    Published 2018
    “…In this work, the optimization of biochemical systems production is performed by using a hybrid method of Newton competitive genetic algorithm is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Revolutionizing video analytics: a review of action recognition using 3D by Jeddah, Yunusa Mohammed, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ibrahim, Adamu Abubakar

    Published 2024
    “…As an interdisciplinary field, the 3D video action recognition model interprets human actions in three-dimensional video data using approaches such as pose-based, volumetric, motionbased, and hybrid methods. 3D video action recognition finds application in surveillance, sports analysis, human-computer interaction, healthcare, robotics, and augmented/virtual reality. …”
    Get full text
    Get full text
    Article
  10. 10

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…Using the same hardware configuration, the different algorithms produced different outcomes on the output of the controller. …”
    Conference paper
  11. 11

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simulation of an adaptive artificial neural network for power system security enhancement including control action by Al-Masri, Ahmed Naufal A., Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Mariun, Norman

    Published 2015
    “…This paper presents a new method for enhancing power system security, including a remedial action, using an artificial neural network (ANN) technique. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The more the algorithm use in a project the better performance will be in result.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Computational intelligence in steganalysis environment by Din, Roshidi, Samsudin, Azman

    Published 2008
    “…Three (3) major methods have also been identified in the computational intelligence based on these steganalysis domains which are bayesian, neural network, and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…Most of the known encryption algorithms are computationally expensive resulting in a significant amount of time added to packet delay. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…The results from the previous stage will be used to generate visualizations by using the D3.js library. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…After that, autonomous anomaly detection for streaming data (AADS) is proposed to detect anomalies in any amount of data. The AADS algorithm uses evolving methods which are evolving autonomous data partitioning (eADP) and non-weighted frequency equations. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
    Get full text
    Get full text
    Thesis