Search Results - (( affecting implementation case algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- affecting implementation »
- customization algorithm »
- implementation case »
- java application »
- case algorithm »
-
1
PID control system implementation in embedded system for DC motor speed control
Published 2008“…Three experiments have been done to look how much PID control algorithms affect the performances on driving actual DC motor; P1 algorithm experiment, PD algorithm experiment and PID algorithm experiment. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Web Algorithm search engine based network modelling of Malaria Transmission
Published 2013“…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
An improved firefly algorithm for optimal microgrid operation with renewable energy
Published 2017“…The IFA method has been implemented using MATLAB software. The results obtained by IFA was compared to FA and other algorithms based on optimal cost, convergence characteristics and robustness to validate the effectiveness of the IFA. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
6
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
An Improved Diabetes Risk Prediction Framework : An Indonesian Case Study
Published 2018“…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…The algorithm is validated using two different methodologies: a simulation model in MATLAB/Simulink and hardware implementation. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…As train networks expand, routes complexity increases thus indirectly affecting accustomed user. Users are left to their own devices in order to figure out the best route based on their requirements. …”
Get full text
Get full text
Thesis -
11
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Hence, the research objective is to create an improved diabetic disease detection system using a Flock Optimization Algorithm-Based Deep Learning Model (FOADLM) feature modeling approach that leverages the PIMA Indian dataset to predict and classify diabetic disease cases. …”
Get full text
Get full text
Article -
12
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…This approach is remarkably theoretically efficient, and this approach is the basis of this project to implement a prototype that uses this approach. In this project, for embedding, neural network with adaptive smoothing error back propagation that keeps trying to refine the Stego file until it reaches the best embedding results besides another adaptive Steganography method using concepts called main cases and sub cases. …”
Get full text
Get full text
Thesis -
13
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
Get full text
Get full text
Thesis -
14
Analysis and simulation of handoff scenario for wireless communication network / Darul Ridzuan Muhamad Halib
Published 2006“…It involved a brief study of the various parameters affecting the handoff procedure. It includes a Matlab implementation of the received power (with gaussian noise) versus the distance in the soft handoff case for a mobile moving between two base stations separated by distance d, along a straight line with fixed velocity. …”
Get full text
Get full text
Thesis -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An efficient CSMA-CA algorithm for IEEE 802.15.4 wireless sensor networks
Published 2012“…In return, this problem affects the channel utilization and packet collisions. …”
Get full text
Get full text
Conference or Workshop Item -
17
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Data recorded in the shortest path analysis process reveals that the evaluation and the prediction on workload performance of shortest path analysis using Dijkstra algorithm has been well implemented. It has been proven that the proposed CBR using Hash Search technique has resulted in an excellent prediction of the accuracy measurement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
The transmission dynamic of the COVID 19 outbreak : a predictive dashboard
Published 2021“…Movement Control Order (MCO) and social distancing which have been implemented as control measures in Malaysia also affected many sectors. …”
Get full text
Get full text
Get full text
Article -
19
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
20
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section
