Search Results - (( work motivation based algorithm ) OR ( _ application system algorithm ))
Search alternatives:
- motivation based »
- system algorithm »
-
1
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The motivation of this work originates from recent studies on sketch-based modeling that emphasize on the reliance of the designers on traditional methods for conveying their ideas. …”
Get full text
Get full text
Thesis -
2
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
3
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…Hence, a wide range of studies has been focused on determining the optimal weight values of ANN models and the number of hidden neurons. In this research work, the motivation is to develop an autonomous learning model based on the hybridization of an adaptive ANN and a metaheuristic algorithm for optimizing ANN parameters so that the network could perform learning and adaptation in a more flexible way and handle condition classification tasks more accurately in industries, such as in power systems. …”
Get full text
Get full text
Get full text
Thesis -
4
A hybrid constraint-based programming approach to design a sports tournament scheduling
Published 2011“…Subsequently,previous work related to the problem is discussed. Thus, we present an innovative hybrid of a constraint-based algorithm and a neighbourhood search, which is an exploration into alternative and improved methodology in the problem of sports tournament scheduling with special multiple constraints. …”
Get full text
Get full text
Get full text
Article -
5
Survey on language processing algorithm for sign language synthesizer
Published 2017“…In this paper, we provide a comprehensive review on the work in SL synthesizer development. SL synthesizer is a tool that synthesizes or constructs series of signs of a particular SL based on the speech input given to the system. …”
Get full text
Get full text
Get full text
Article -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
Get full text
Get full text
Thesis -
8
Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting
Published 2014“…With the successful modeling and simulation of the AREVA MiCOM P441 distance relay and its recording facility, such subsequent works as data extraction and preparation, computational intelligence-based data mining for relay decision algorithm discovery and finally a relay analysis expert system development can certainly be executed. …”
Get full text
Get full text
Article -
9
Permutation entropy based full-reference image quality qssessment
Published 2019“…Motivated by the need of appropriate objective models, we propose a novel objective IQA algorithm, namely, Permutation Entropy Deviation Index (PEDI), based on the working principle of permutation entropy (PE). …”
Get full text
Get full text
Conference or Workshop Item -
10
Adaptive neurofuzzy inference system for an active transfemoral prosthetic leg using in-socket sensory system / Nur Hidayah Mohd Yusof
Published 2019“…The first part of this work is the development of an Adaptive Neurofuzzy Inference System (ANFIS) - based algorithm to human gait phase recognition. …”
Get full text
Get full text
Get full text
Thesis -
11
Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias
Published 2021“…However, a large percentage of hospitalized patients are unable to use such device due to hand weakness or the device is unreachable to the patient when positioned away, especially for patients with tetraplegia. This problem has motivated the development of a fabric-based multi-array pressure sensor as a call bell garment that works by detecting the pressure pattern on a pillow surface where the patient is lying down. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
A flexible query transformation framework for structured retrieval / Gan Keng Hoon
Published 2013“…Once a source query is interpreted and represented as intermediate query, it can be easily mapped to a structured query language using a set of predefined query templates in knowledge base. Lastly, experiments are carried out at the algorithm, application and representation levels on both synthetic and real world data sets to demonstrate the feasibility and scalability of the query transformation framework. …”
Get full text
Get full text
Thesis -
15
NETASA: neural network based prediction of solvent accessibility
Published 2002“…Results: Prediction in two and three state classification systems with several thresholds are provided. Our prediction method achieved the accuracy level upto 90% for training and 88% for test data sets. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
17
Text independent speaker identification using gaussian mixture model
Published 2007“…For speaker model training, a fast re-estimation algorithm based on highest likelihood mixture clustering is introduced. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Analysing ratio-based controllers against motivational game theory in peer-to-peer renewable energy trading
Published 2024“…A comparative analysis is conducted against a second controller employing a Motivational Game Theory (MGT) algorithm that incorporates prioritization of energy distribution based on price adjustments. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
20
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
Get full text
Get full text
Thesis
