Search Results - (( using function _ algorithm ) OR ( knowledge visualization using algorithm ))

Refine Results
  1. 1

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis
  2. 2

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Normative Fish Swarm Algorithm For Global Optimization With Applications by Tan, Weng Hooi

    Published 2019
    “…Artificial Fish Swarm Algorithm (AFSA) have become popular optimization technique used to solve various problems, Nevertheless, according to surveys, the existing fish swarm algorithms still have some deficiencies to strike the exact optimum within appropriate convergence rate. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Hybrid genetic algorithm for uncapacitated university examination timetabling problem by Ishak, Suhada

    Published 2015
    “…All proposed algorithms are coded in C using Microsoft Visual C++ 6.0 as the compiler. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…The design network is trained by presenting several target machining data that the network must learn according to a learning rule (algorithm). In designing the network, a combination of back propagation or generalized delta learning rule with sigmoid transfer function has been used. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic modelling of proton exchange membrane fuel cell system for electric bicycle / Azadeh Kheirandish by Azadeh, Kheirandish

    Published 2016
    “…Recent models provide high accuracies using complex systems and complicated calculations using advanced optimization algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Developing an automated segmentation algorithm might give better results.…”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Generalized Fuzzy Linguistic Bicubic B-Spline Surface Model for Uncertain Fuzzy Linguistic Data by Mohd Syafiq Bidin, Abd. Fatah Wahab, Mohammad Izat Emir Zulkifly, Rozaimi Zakaria

    Published 2022
    “…Therefore, the study aims to develop a new model of a B-spline surface using a different approach of a crisp and fuzzy linguistic point relation with three types of linguistic function: low L, medium Mi and high H. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Detection of Epileptic EEG Signal Using Wavelet Transform and Adaptive Neuro-Fuzzy Inference System by Khosropanah, Pegah

    Published 2011
    “…Such algorithms use brain electrical activity signals called electro encephalography (EEG) and have 2 methods of detection: visual (by specialist inspection) and automatic (by using signal processing knowledge). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss by Idriss Moussa , Idriss

    Published 2021
    “…Most of the existing algorithms rely on MAP (Maximuma Priori) and VB (Variational Bayesian)which are based on deterministic and stochastic methodologies, respectively, to estimate the blur function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Molecular Dynamic Simulation of CO2 Absorption into Mixed Aqueous Solutions MDEA/PZ by Noorlisa, Harun, Emyra Ezzaty, Masiren

    Published 2017
    “…The thermodynamic ensemble used were 200 ps for NVE and 1 ns for NVT. The periodic boundary is used to visualize the interaction of molecules of the whole system. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
    Get full text
    Get full text
    Undergraduates Project Papers