Search Results - (( work motivation based algorithm ) OR ( _ application system algorithm ))

Refine Results
  1. 1

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The motivation of this work originates from recent studies on sketch-based modeling that emphasize on the reliance of the designers on traditional methods for conveying their ideas. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee by Chong , Hue Yee

    Published 2023
    “…Hence, a wide range of studies has been focused on determining the optimal weight values of ANN models and the number of hidden neurons. In this research work, the motivation is to develop an autonomous learning model based on the hybridization of an adaptive ANN and a metaheuristic algorithm for optimizing ANN parameters so that the network could perform learning and adaptation in a more flexible way and handle condition classification tasks more accurately in industries, such as in power systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A hybrid constraint-based programming approach to design a sports tournament scheduling by Soong, Chai Juan, Ramli, Razamin, Ibrahim, Haslinda

    Published 2011
    “…Subsequently,previous work related to the problem is discussed. Thus, we present an innovative hybrid of a constraint-based algorithm and a neighbourhood search, which is an exploration into alternative and improved methodology in the problem of sports tournament scheduling with special multiple constraints. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Survey on language processing algorithm for sign language synthesizer by Maarif, Haris Al Qodri, Akmeliawati, Rini, Gunawan, Teddy Surya

    Published 2017
    “…In this paper, we provide a comprehensive review on the work in SL synthesizer development. SL synthesizer is a tool that synthesizes or constructs series of signs of a particular SL based on the speech input given to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…With the successful modeling and simulation of the AREVA MiCOM P441 distance relay and its recording facility, such subsequent works as data extraction and preparation, computational intelligence-based data mining for relay decision algorithm discovery and finally a relay analysis expert system development can certainly be executed. …”
    Get full text
    Get full text
    Article
  9. 9

    Permutation entropy based full-reference image quality qssessment by Baqar, Mohtashim *, Lau, Sian Lun *, Mansoor Ebrahim

    Published 2019
    “…Motivated by the need of appropriate objective models, we propose a novel objective IQA algorithm, namely, Permutation Entropy Deviation Index (PEDI), based on the working principle of permutation entropy (PE). …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Adaptive neurofuzzy inference system for an active transfemoral prosthetic leg using in-socket sensory system / Nur Hidayah Mohd Yusof by Nur Hidayah , Mohd Yusof

    Published 2019
    “…The first part of this work is the development of an Adaptive Neurofuzzy Inference System (ANFIS) - based algorithm to human gait phase recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias by Normazlianita, Mohamad Alias

    Published 2021
    “…However, a large percentage of hospitalized patients are unable to use such device due to hand weakness or the device is unreachable to the patient when positioned away, especially for patients with tetraplegia. This problem has motivated the development of a fabric-based multi-array pressure sensor as a call bell garment that works by detecting the pressure pattern on a pillow surface where the patient is lying down. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    A flexible query transformation framework for structured retrieval / Gan Keng Hoon by Gan, Keng Hoon

    Published 2013
    “…Once a source query is interpreted and represented as intermediate query, it can be easily mapped to a structured query language using a set of predefined query templates in knowledge base. Lastly, experiments are carried out at the algorithm, application and representation levels on both synthetic and real world data sets to demonstrate the feasibility and scalability of the query transformation framework. …”
    Get full text
    Get full text
    Thesis
  15. 15

    NETASA: neural network based prediction of solvent accessibility by Ahmad, Shandar, Gromiha, M. Michael

    Published 2002
    “…Results: Prediction in two and three state classification systems with several thresholds are provided. Our prediction method achieved the accuracy level upto 90% for training and 88% for test data sets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Based on the selected features, the classification is performed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Text independent speaker identification using gaussian mixture model by Ting, Chee Ming, Shaikh Salleh, Sheikh Hussain, Tan, Tian Swee, Ariff, Ahmad Kamarul

    Published 2007
    “…For speaker model training, a fast re-estimation algorithm based on highest likelihood mixture clustering is introduced. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Analysing ratio-based controllers against motivational game theory in peer-to-peer renewable energy trading by Abdullah Azahari, Abdul Aziz, Mohamad Hanif, Noor Hazrin Hany, Mohamed, Martina Muhaizira

    Published 2024
    “…A comparative analysis is conducted against a second controller employing a Motivational Game Theory (MGT) algorithm that incorporates prioritization of energy distribution based on price adjustments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Based on the selected features, the classification is performed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
    Get full text
    Get full text
    Thesis