Search Results - (( course extraction method algorithm ) OR ( related information sharing algorithm ))*

Refine Results
  1. 1

    Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks by Krishnasamy, Ganesh, Paramesran, Raveendran

    Published 2019
    “…Recently, considerable advancement has been achieved in semisupervised multitask feature selection methods, which they exploit the shared information from multiple related tasks. Besides, these algorithms have adopted manifold learning to leverage both the unlabeled and labeled data since its laborious to obtain adequate labeled training data. …”
    Get full text
    Get full text
    Article
  2. 2

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…Recently, considerable advancement has been achieved in semi-supervised multi-task feature selection algorithms, where they have exploited the shared information from multiple related tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Image Retrieval System (RGB) by Zahir, Zarith Suraya

    Published 2005
    “…Thus, this project showed that images retrieved by using the global color histogram may not be semantically related even though they share similar color distribution in some results. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Access nodes are equipped with a fixed transmitter and fixed receiver for the control information exchange. In this research, the management of the shared network resources has been researched extensively with the intention to enhance the performance of the network and overcome the MAC protocols related limitations. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust by Meddour, Houcine

    Published 2016
    “…The results also revealed that the direct relationships between organizational capacity (human resource practices), and organizational environment (information technology, networks) were significantly related to trust. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Over the last two decades, researchers have been trying to create algorithms to measure end-to-end available bandwidth and other bandwidth-related metrics accurately, quickly, and without affecting the traffic of the path. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Flexible content authorization using digital rights management in cloud computing / Ali Hussain by Ali , Hussain

    Published 2021
    “…And more prominent in online social media platform due to their flexible sharing feature which can make false information viral in negligible time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The authors introduce Integrative Information Management Architecture (IIMA) running on collaboration algorithms which create semi automated intermediary processes to support management team address integration challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Prospective use of bloom filter and muxing for information centric network caching by Abdullahi, Ibrahim, Hassan, Suhaidi, Arif, Suki

    Published 2015
    “…Information dissemination as the main objective of setting up the Internet has seen different folds to improve its course.Information centric networking (ICN) has been introduced with the aim of curtailing some future challenges posed at the traditional Internet in the nearest future.ICN advantage of caching chunks of information on-path and off-path of the network stands the paradigm out as an alternative shift from host centric network to name centric.ICN caching approach can thereby significantly reduce amount of times a host is visited.Bloom Filter with its advantage of fast searching and false positivity characteristics are seen as form of message retrieval practice to improve interest serving on the network.This paper analyzed the advantages of vending and adopting Bloom Filters and Muxing as research directions to minimize excessive bandwidth consumption, lesser delays, prompt delivery of information, higher throughput and the ability to share information from troubled stations.Concepts are proposed and wider algorithms are pointed out to increase the overall ICN framework as related to caching and other network services.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    The design and implementation of Malaysian indigenous herbs knowledge management system based on ontology model by Sahri, Zulazeze, Abd Aziz, Muhd Eizan Shafiq, Ramli, Nazirah, Canda, Roger

    Published 2016
    “…The transformation from OWL to Relational database is based on the OWL2DB algorithm guideline will be further discussed in this research.Assisted by the System Development Life Cycle (SDLC) methodology, MiHerbs is expected to help herbal research agencies, private sector and government to store and share their herbal related information via the system to provide an ease information access to public or even people around the world.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A survey of exploratory search systems based on LOD resources by Jacksi, Karwan, Dimililer, Nazife, Zeebaree, Subhi R. M.

    Published 2015
    “…The fact that the existing Web allows people to effortlessly share data over the Internet has resulted in the accumulation of vast amounts of information available on the Web.Therefore, a powerful search technology that will allow retrieval of relevant information is one of the main requirements for the success of the Web which is complicated further due to use of many different formats for storing information. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Haemoglobin distribution in ulcers for healing assessment by Malik, Aamir Saeed, Fadzil, A. F. M., Arshad, Leena, Jamil, Adawiyah, Yap, Felix

    Published 2012
    “…Data clustering techniques are implemented to classify and segment detected regions of granulation tissue from the extracted haemoglobin images. Results obtained indicate that the developed algorithm performs fairly well with an average sensitivity of 88.24% and specificity of 98.82% when compared to the dermatologist's assessment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
    Get full text
    Get full text
    Get full text
    Thesis