Search Results - (( basic element prediction algorithm ) OR ( java segmentation using algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…By collecting all the dataneeded such as speed and location, an algorithm can be developed to predict when the transport will reach a certain checkpoint. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  4. 4

    Predicting Flow Rate of V-Shape Customm Tank Using Derivative Free Recursive Algorithm by Tawfeiig, Huzzaifa, Asirvadam , Vijanth Sagayan, Saad , Nordin

    Published 2011
    “…One of the basic elements that any plant process facility consists of is control tank system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  5. 5
  6. 6

    PREDICTING FLOW RATE AND LEVEL OF CUSTOM TANK USING PARTICLE FILTER by TAWFEIG AHMED IZZELDIN, HUZAIFA

    Published 2009
    “…One of the basic elements that any plant process facility consists of is control tank system. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  11. 11

    Modelling of clinical risk groups (CRGs) classification using FAM by Mohd. Asi, Salina, Saad, Puteh

    Published 2006
    “…This paper views CRGs clinical logic and the data elements focus on identification of CRGs features using FAM. …”
    Get full text
    Get full text
    Conference or Workshop Item