Search Results - (( course detection method algorithm ) OR ( related information sharing algorithm ))*

Refine Results
  1. 1

    Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks by Krishnasamy, Ganesh, Paramesran, Raveendran

    Published 2019
    “…Recently, considerable advancement has been achieved in semisupervised multitask feature selection methods, which they exploit the shared information from multiple related tasks. Besides, these algorithms have adopted manifold learning to leverage both the unlabeled and labeled data since its laborious to obtain adequate labeled training data. …”
    Get full text
    Get full text
    Article
  2. 2

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…Recently, considerable advancement has been achieved in semi-supervised multi-task feature selection algorithms, where they have exploited the shared information from multiple related tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Image Retrieval System (RGB) by Zahir, Zarith Suraya

    Published 2005
    “…Thus, this project showed that images retrieved by using the global color histogram may not be semantically related even though they share similar color distribution in some results. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Access nodes are equipped with a fixed transmitter and fixed receiver for the control information exchange. In this research, the management of the shared network resources has been researched extensively with the intention to enhance the performance of the network and overcome the MAC protocols related limitations. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified perturb & observe maximum power point technique for solar photovoltaic systems by Premkumar M., Sudhakar Babu T., Sowmya R.

    Published 2023
    “…By varying the step size of the perturbation in the traditional P&O algorithm, it can able to detect the maximum power point (MPP) in any situation, and it can be implemented with less cost while compared to the conventional models. …”
    Article
  7. 7

    Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust by Meddour, Houcine

    Published 2016
    “…The results also revealed that the direct relationships between organizational capacity (human resource practices), and organizational environment (information technology, networks) were significantly related to trust. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Lane detection system for autonomous vehicle using image processing techniques by Mohd Kiblee, Shahizul Eza

    Published 2005
    “…A Radon peak detection algorithm was developed based on two values, Rand O. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Over the last two decades, researchers have been trying to create algorithms to measure end-to-end available bandwidth and other bandwidth-related metrics accurately, quickly, and without affecting the traffic of the path. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Article
  11. 11

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Flexible content authorization using digital rights management in cloud computing / Ali Hussain by Ali , Hussain

    Published 2021
    “…And more prominent in online social media platform due to their flexible sharing feature which can make false information viral in negligible time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The authors introduce Integrative Information Management Architecture (IIMA) running on collaboration algorithms which create semi automated intermediary processes to support management team address integration challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Prospective use of bloom filter and muxing for information centric network caching by Abdullahi, Ibrahim, Hassan, Suhaidi, Arif, Suki

    Published 2015
    “…Information dissemination as the main objective of setting up the Internet has seen different folds to improve its course.Information centric networking (ICN) has been introduced with the aim of curtailing some future challenges posed at the traditional Internet in the nearest future.ICN advantage of caching chunks of information on-path and off-path of the network stands the paradigm out as an alternative shift from host centric network to name centric.ICN caching approach can thereby significantly reduce amount of times a host is visited.Bloom Filter with its advantage of fast searching and false positivity characteristics are seen as form of message retrieval practice to improve interest serving on the network.This paper analyzed the advantages of vending and adopting Bloom Filters and Muxing as research directions to minimize excessive bandwidth consumption, lesser delays, prompt delivery of information, higher throughput and the ability to share information from troubled stations.Concepts are proposed and wider algorithms are pointed out to increase the overall ICN framework as related to caching and other network services.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    The design and implementation of Malaysian indigenous herbs knowledge management system based on ontology model by Sahri, Zulazeze, Abd Aziz, Muhd Eizan Shafiq, Ramli, Nazirah, Canda, Roger

    Published 2016
    “…The transformation from OWL to Relational database is based on the OWL2DB algorithm guideline will be further discussed in this research.Assisted by the System Development Life Cycle (SDLC) methodology, MiHerbs is expected to help herbal research agencies, private sector and government to store and share their herbal related information via the system to provide an ease information access to public or even people around the world.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…In this project we do propose a construction of “DurianCare”, a mobile application that able to utilize techniques of Convolutional Neural Networks (CNN), Precision Agriculture, and Content Based Filtering for enhancing the farming practices of sustaining crops by advanced disease detection and the guided recommendation. The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A survey of exploratory search systems based on LOD resources by Jacksi, Karwan, Dimililer, Nazife, Zeebaree, Subhi R. M.

    Published 2015
    “…The fact that the existing Web allows people to effortlessly share data over the Internet has resulted in the accumulation of vast amounts of information available on the Web.Therefore, a powerful search technology that will allow retrieval of relevant information is one of the main requirements for the success of the Web which is complicated further due to use of many different formats for storing information. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The objectives of this project are to generate conflict-free and customizable schedules, enable real-time collaboration among students, and offer administrative tools for maintaining course information. The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis