Search Results - (( parallel optimization path algorithm ) OR ( variable discriminant using algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…The difference between the two algorithms is in terms of the order of resampling and variable extraction prior to the construction of linear discriminant analysis (LDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  10. 10

    Strategies of Handling Different Variables Reduction for LDA by Hamid, Hashibah, Mahat, Nor Idayu

    Published 2012
    “…The variables selection technique with local searching algorithm is manipulated. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks by Chien, Stephen Lim Een, Raja Maamor Shah, Raja Noor Farah Azura, Othman, Mohamed

    Published 2016
    “…A tree visualisation was constructed based on its connectivity to enable the generation of formulae for optimal diameter and average optimal path lengths. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Pattern Recognition for Human Diseases Classification in Spectral Analysis by Nur Hasshima Hasbi, Abdullah Bade, Fuei, Pien Chee, Muhammad Izzuddin Rumaling

    Published 2022
    “…On the other hand, classification methods are techniques or algorithms used to group samples into a predetermined category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Machine Learning Classifications of Multiple Organ Failures in a Malaysian Intensive Care Unit by Shah N.N.H., Razak N.N.A., Razak A.A., Abu-Samah A., Suhaimi F.M., Jamaluddin U.

    Published 2025
    “…Several machine learning algorithms which are decision tree, linear discriminant, na�ve Bayes, support vector machines, k-nearest neighbor, AdaBoost, and random forest were used for the classification. …”
    Article
  16. 16

    Machine learning classifications of multiple organ failures in a malaysian intensive care unit by Norliyana, Nor Hisham Shah, Normy Norfiza, Abdul Razak, Athirah, Abdul Razak, Asma’, Abu-Samah, Fatanah, M. Suhaimi, Ummu Kulthum, Jamaludin

    Published 2024
    “…Several machine learning algorithms which are decision tree, linear discriminant, naïve Bayes, support vector machines, k-nearest neighbor, AdaBoost, and random forest were used for the classification. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimized conditioning factors using machine learning techniques for groundwater potential mapping by Kalantar, Bahareh, Al-Najjar, Husam A. H., Pradhan, Biswajeet, Saeidi, Vahideh, Abdul Halin, Alfian, Ueda, Naonori, Naghibi, Seyed Amir

    Published 2019
    “…In addition, 917 spring locations were identified and used to train and test three machine learning algorithms, namely Mixture Discriminant Analysis (MDA), Linear Discriminant Analysis (LDA) and Random Forest (RF). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20