Search Results - (( using function based algorithm ) OR ( knowledge internalization using algorithm ))

Refine Results
  1. 1

    Reliability fuzzy clustering algorithm for wellness of elderly people by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Therefore, the implementation of z-numbers is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. Thus, the objective of this paper is to propose a reliable fuzzy clustering algorithm using z-numbers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Thus, there are two objectives of this paper; (i) to propose a reliable fuzzy clustering algorithm using z-numbers and; (ii) to cluster the Chronic Kidney Disease (CKD) patients based on the selected indicators to identify which cluster the patients belongs to (Cluster 0, Cluster 1, Cluster 2, Cluster 3 or Cluster 4) based on the membership functions defined. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…Using less power, the proposed architecture is implemented based on python programming language, thereby improving time and power requirements compared to the traditional algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    The compact genetic algorithm for likelihood estimator of first order moving average model by Al-Dabbagh, R.D., Baba, M.S., Mekhilef, Saad, Kinsheel, A.

    Published 2012
    “…Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA) by Othman, Mahmod, Ku-Mahamud, Ku Ruhana, Hawani, Shezrin, Hamzah, Amir, Khalid, Shaiful Annuar, Abdullah, Fader

    Published 2013
    “…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The security of the algorithm on the other hand, is based on the randomness of the output from the encryption process. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Predicting the popularity of tweets using the theory of point processes. by Tan, Wai Hong

    Published 2019
    “…The knowledge is combined using a novel empirical Bayes type approach, where the prior distribution for the model parameter is constructed based on the external knowledge, and the likelihood is calculated based on the internal knowledge. …”
    Get full text
    Get full text
    UMK Etheses
  11. 11

    Classification of machine learning engines using latent semantic indexing by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Functional descriptors of each program are identified by extracting terms contained in the source code.In addition, information on where the terms are extracted from is also incorporated in the LSI.Based on the undertaken experiment, the LSI classifier is noted to generate a higher precision and recall compared to the C4.5 algorithm as provided in the Weka tool.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Prediction of nanostructure of SnO2 properties using artificial neural networks / Khadijah Mohd Suhami ... [et al.] by Mohd Suhami, Khadijah, Inderan, Vicinisvarri, Senin, Syahrul Fithry, Lee, Hooi Ling

    Published 2021
    “…The data set was trained using hyperbolic tangent sigmoid (tansig) activation function and Levenberg-Marquardt training algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…These weights are assigned randomly or generated using other procedures such as Nguyen-Widrow initialization algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Random forest algorithm for co2 water alternating gas incremental recovery factor prediction by Belazreg, L., Mahmood, S.M., Aulia, A.

    Published 2020
    “…The aim of this paper is using an ensemble machine learning algorithm to develop a WAG incremental recovery factor predictive model that can be used by reservoir engineers to estimate WAG incremental recovery factor prior kick-off of laboratory experiments and comprehensive technical studies. …”
    Get full text
    Get full text
    Article
  15. 15

    Classification of polymorphic virus based on integrated features by A Hamid, Isredza Rahmi, Subramaniam, Sharmila, Sutoyo, Edi, Abdullah, Zubaile

    Published 2018
    “…Standard virus classification relies on the use of virus function, which is a small number of bytes written in assembly language. …”
    Get full text
    Get full text
    Article
  16. 16

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A framework for automatic modelling of survival using fuzzy inference. by Hamdan, Hazlina, Garibaldi, Jonathan M.

    Published 2012
    “…Further, the rule base can be established by enumerating all possible combinations of membership functions of all inputs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Discretization of integrated moment invariants for writer identification by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Maryam, Darus, Maslina

    Published 2008
    “…Conservative regular moments have been proven to exhibit some shortcomings in the original formulations of moment functions in terms of scaling factor. Hence, an incorporated scaling factor of geometric functions into United Moment Invariant function is proposed for mining the feature of unconstrained words. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Intelligent control of grain drying process using fuzzy logic controller. by Mansor, Halimathon, Mohd Noor, Samsul Bahari, Raja Ahmad, Raja Mohd Kamil, Taip, Farah Saleena, Lutfy, Omar F.

    Published 2010
    “…Two inputs and one output fuzzy logic controller has been designed to drive the grain flow rate which is used as the manipulated variable. A new algorithm of fuzzy logic controller for a grain drying process has been introduced. …”
    Get full text
    Get full text
    Article