Search Results - (( basic step function algorithm ) OR ( java application means algorithm ))

Refine Results
  1. 1

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Landslide susceptibility and hazard assessments are the most important steps in landslide risk mapping. The main objective of this study was to investigate and compare the results of two artificial neural network (ANN) algorithms, i.e., multilayer perceptron (MLP) and radial basic function (RBF) for spatial prediction of landslide susceptibility in Vaz Watershed, Iran. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  5. 5

    A preemptive utility accrual scheduling algorithm in adaptive real time system. by Ahmad, Idawaty, Subramaniam, Shamala, Othman, Mohamed, Othman, Muhammad Fauzan

    Published 2008
    “…We consider independent task models that are subject to deadline constraints specified using step time/utility functions (or TUFs). The basic idea of our algorithm is to reduce the number of unnecessary abortion that occurs in GUS by preemption instead of abortion. …”
    Get full text
    Get full text
    Article
  6. 6

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming by Abdul Rahim, Ruzairi, Mohd. Nayan, Norkharziana, Fazalul Rahiman, Mohd. Hafiz

    Published 2006
    “…In order to process and simulate a tomography system, it has been found that Visual C++ programming has an advantage one step ahead compared to Visual Basic programming. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Simulation on Emotion Recognition for Autism Therapy by Adzmi, Muhammad Azrin

    Published 2017
    “…Deriving an effective facial representation from authentic face snap shots is an essential step for a success facial features reputation. On this paper, we empirically evaluate facial representation based totally on statistical local functions, neighborhood Binary styles, for person-independent facial expression recognition. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Memoryless modified symmetric rank-one method for large-scale unconstrained optimization by Modarres, Farzin, Abu Hassan, Malik, Leong, Wah June

    Published 2009
    “…Problem statement: Memoryless QN methods have been regarded effective techniques for solving large-scale problems that can be considered as one step limited memory QN methods. In this study, we present a scaled memoryless modified Symmetric Rank-One (SR1) algorithm and investigate the numerical performance of the proposed algorithm for solving large-scale unconstrained optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…The design of the APFLC is initially started with the designation of Basic FLC with two input and single output system. …”
    Get full text
    Thesis
  19. 19
  20. 20

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis