Search Results - (( data implication based algorithm ) OR ( based generation using algorithm ))

Refine Results
  1. 1

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…To bridge this gap, a five-phase research methodology is structured to propose and evaluate an algorithm enabling the external modification of LLM-generated word vectors using scalar values as the focus weightage. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…The findings suggest that if one wants to use RDBMS to manage XML data, the mapping from XML document to relations must based be on functional dependency constraints.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
    Get full text
    Get full text
    Article
  4. 4

    Pemahaman guru matematik Tahun Enam tentang pembahagian nombor bulat / Hoi Sim Min by Hoi , Sim Min

    Published 2018
    “…This study also found that teachers have four general patterns of thought and an algorithm to solve the problem of division of whole numbers, that is, the general pattern of thought of partition, measurement, repeated subtraction, the inverse of multiplication , and long division algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…The existing fuzzy implication operators are capable of handling only two dimensional data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL) by Ku, Soh Ting, Talib, Othman, Md. Yunus, Aida Suraya, Zolkepli, Maslina

    Published 2019
    “…It is also highlights ways that students can evolve from technical skills in using technology to soft engineering skills by using coding knowledge.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Farm credit, farmland, farm infrastructure and agricultural output in Kano State, Nigeria : the moderating effect of murabahah finance by Mohammed, Ahmed Ibrahim

    Published 2017
    “…Likewise, Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…The objectives this research are to investigate hybrid algorithm in game generator, to develop Sudoku generator based on hybrid algorithm and lastly to test and evaluate the Sudoku generator using time comparison. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…The algorithms are used to generate test cases for nine different Boolean expressions of different size and complexities. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Metaheuristic searching genetic algorithm based reliability assessment of hybrid power generation system by Abdalla, Ahmed N., Nazir, Muhammad Shahzad, Ming, Xin Jiang, Kadhem, Athraa Ali, Abdul Wahab, Noor Izzri, Suqun, Cao, Rendong, Ji

    Published 2020
    “…The usefulness of the proposed algorithm was tested using Reliability Test System ‘IEEE-RTS-79’ which include both of wind power and solar power generation. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Multi-objective pareto ant colony system based algorithm for generator maintenance scheduling by Shimailawi, Shatha Abdulhadi Muthana

    Published 2022
    “…The proposed models and algorithm can be used to solve the multi-objective GMS problem while the new parameters’ values can be used to obtain optimal or near optimal maintenance scheduling of generators. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Practical implications – The identification algorithm is expected to facilitate the required model development for model-based control design for autonomous helicopter development. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…Active detection algorithm generates disturbances at the output by Positive feedback and Continuous feedback signal injection which is based on DQ implementation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern by Angeline Teoh, Szu Fern

    Published 2012
    “…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq by Al‑Aqeeli, Yousif H., Lee, Teang Shui, Abd Aziz, Samsuzana

    Published 2016
    “…The GAOM achieved an increase in hydropower generation in 17 scenarios using these two algorithms, with the Salg being superior in all scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A data driven approach to wind plant control using moth-flame optimization (MFO) algorithm by Idris, M. A. M, Hao, Mok Ren, Mohd Ashraf, Ahmad

    Published 2019
    “…Numerical results show that the MFO based approach generates better total wind power generation than spiral dynamic algorithm (SDA) based approach and safe experimentation dynamics (SED) based approach.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20