Search Results - (( _ application ((growth algorithm) OR (acs algorithm)) ) OR ( its application usage algorithm ))*

Refine Results
  1. 1

    The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.] by Rabing, Jesse Vince, Abd.Aziz, Khairul Naim, Kamaruddin, Sharir Aizat, Roslani, Muhammad Akmal, Tajam, Jamil, Ahmad, Aziani, Nazri, Rosnani, Zainol, Zamzila Erdawati, Ramli, Rohayu, Shaari, Mohd Idrus

    Published 2022
    “…This study explores the applicability of ratio algorithms for estimation of the chl- a concentration at Sungai Merbok by assessing chl-a distribution pattern built by the algorithms and evaluating each algorithm for their errors compared to in-situ data. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    Control of direct multi- input multi-output (MIMO) using single-phase matrix converter (SPMC) topology / Mohd Shukri Mohd Ghazali by Mohd Ghazali, Mohd Shukri

    Published 2023
    “…There are numerous studies demonstrating the practical applications of power electronic converters. There are four types of converters, DC-DC, AC-AC, AC-DC, and DC-AC energy conversion. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Study on the microbial growth inhibition by using pineapple leaves juice by Amirah, Ya'acob

    Published 2022
    “…The SVSJ was consequently used as the line outage severity indicator in the implementation of contingency analysis and ranking. The application of SVSI was extended for the evaluation of the constrained power planning (CPP) and Flexible AC Transmission Systems (FACTS) devices installation using Evolutionary Programming (EP) by considering multi-contingencies occurrence in the system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Remotely sensed imagery data application in mangrove forest: a review by Abdul Whab @ Abdul Wahab, Zulfa, Kamarudin, Norizah

    Published 2018
    “…Thus, remote sensing is a highly efficient, low-cost and time-saving technique for mangrove forest measurement. The application of this technique will further add value to the mangrove forest and enhance its in-situ conservation and protection programmes in combating the effects of the rising sea level due to climate change.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. In its simplest form, the existence of intra-user variability within handwritten signature samples of an individual is explored using the Kruskal-Wallis hypothesis test. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Machine learning application to industrial control systems by Bingi, K., Prusty, B.R., Ibrahim, R.

    Published 2022
    “…This chapter focuses on the growth, development, and future of various machine learning techniques in industrial process control applications. …”
    Get full text
    Get full text
    Book
  17. 17

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20