Industrial Machine Allocation Using Rulebased Knowledge Representation Technique.
Peruntukan mesin adalah masalah yang rumit di dalam industri pembuatan. Machine allocation is a complex problem in manufacturing industry.
| Main Author: | Wan Rameli, Wan Nur Akmal |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/24582/ |
| Abstract | Abstract here |
Similar Items
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Vehicle To Vehicle Physical Sidelink Shared Channel Capacity Estimation And Resource Allocation For 5g Network
by: Abubakar, Saadatu
Published: (2024)
by: Abubakar, Saadatu
Published: (2024)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Knowledge Sharing Model For Online Communities Of Practice.
by: Ismail, Aisyah
Published: (2016)
by: Ismail, Aisyah
Published: (2016)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
by: Ye , Hong Hoe
Published: (2006)
by: Ye , Hong Hoe
Published: (2006)
Enhanced Heterogeneous Stacked Ensemble Machine Learning Model For Detecting Nigerian Politically Motivated Cyberhate
by: Sallau, Mullah Nanlir
Published: (2023)
by: Sallau, Mullah Nanlir
Published: (2023)
Hybridization Of Optimized Support
Vector Machine And Artificial Neural
Network For The Diabetic Retinopathy
Classification Problem
by: Kader, Nur Izzati Ab
Published: (2019)
by: Kader, Nur Izzati Ab
Published: (2019)
Hybrid Machine Translation Using Malay-English Language Parallel Text Extraction From Comparable Text
by: Yeong, Yin Lai
Published: (2024)
by: Yeong, Yin Lai
Published: (2024)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
A Social- And Knowledge-Based Coalition Formation Using Modified Combinatorial Particle Swarm Optimization
by: Kassim, Azleena Mohd
Published: (2017)
by: Kassim, Azleena Mohd
Published: (2017)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Dynamic Technique for Optimizing Universal Mobile Telecommunication System Active Set.
by: Mutlag, Samer Abdulsada
Published: (2010)
by: Mutlag, Samer Abdulsada
Published: (2010)
Enhanced Network Connectivity And Node Lifetime Techniques In Wireless Sensor Networks
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
A Pattern-Growth Sentence Compression Technique For Malay Text Summarizer
by: Alias, Suraya
Published: (2018)
by: Alias, Suraya
Published: (2018)
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
by: Shamsuddin, Nurul Afiqah
Published: (2014)
by: Shamsuddin, Nurul Afiqah
Published: (2014)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Antecedents And Consequences Of Cyberloafing Among Knowledge Workers In Malaysian Msc Status Companies: The Moderating
Effect Of Duration On
Cyberloafing Breaks
by: Saidin, Siti Salina
Published: (2019)
by: Saidin, Siti Salina
Published: (2019)
Assessment Of Knowledge, Attitudes,
Perception And Barriers Towards Pharmacovigilance Activities Among Community Pharmacists And Final Year Pharmacy Students In Malaysia.
by: Mahmod Elkalmi, Ramadan Mohamed
Published: (2010)
by: Mahmod Elkalmi, Ramadan Mohamed
Published: (2010)
Identifying Criteria For The Implementation Of Augmented Reality In Malaysian Tourism Industry
by: Ahmed, Abdul Salam Waqar
Published: (2022)
by: Ahmed, Abdul Salam Waqar
Published: (2022)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Enhanced Automated Heterogeneous Data Duplication Model Using Parallel Data Compression And Sorting Technique
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Modified Nsga-Iii As A Many-Objective Optimization Technique For Ab Initio Protein Structure Prediction
by: Smadi, Motasem Mohammad Yaqoob Al
Published: (2024)
by: Smadi, Motasem Mohammad Yaqoob Al
Published: (2024)
Communication Efficient Decentralized Collaborative Learning Of Heterogeneous Deep Learning Models Using Distillation And Incentive-Based Techniques
by: Iqbal, Zahid
Published: (2023)
by: Iqbal, Zahid
Published: (2023)
A Multi-objective Evolutionary Algorithm Based On Decomposition For Continuous Optimization Using A Step-function Technique
by: Chuah, How Siang
Published: (2022)
by: Chuah, How Siang
Published: (2022)
Enhancing Control Flow Comprehension Using Zoom Visual Flow (ZViF) Technique To Represent Control Structures
by: Kadar, Rozita
Published: (2011)
by: Kadar, Rozita
Published: (2011)
Hybrid Deep Networks Based On Periodshift
Cosine Annealing For Customer
Retention Prediction In Telecom
Industry
by: Victor, Johnson Olanrewaju
Published: (2024)
by: Victor, Johnson Olanrewaju
Published: (2024)
An Enhanced Artificial Immune System
Approach For Assembly Line Balancing
Problem Through Shifting Bottleneck
Identification
by: Khalid, Mohd Nor Akmal
Published: (2018)
by: Khalid, Mohd Nor Akmal
Published: (2018)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
ASEAN Monetary Union: Is ASEAN an Optimum Currency Area?
by: Lew, Yuen Sin
Published: (2010)
by: Lew, Yuen Sin
Published: (2010)
Assessing Malaysia’s Manufactured Exports Competitiveness In The East Asian Region: A Shift-Share And Simulation Approach.
by: Leow, Ghin Yin
Published: (2010)
by: Leow, Ghin Yin
Published: (2010)
Similar Items
-
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011) -
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018) -
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020) -
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010) -
Vehicle To Vehicle Physical Sidelink Shared Channel Capacity Estimation And Resource Allocation For 5g Network
by: Abubakar, Saadatu
Published: (2024)
