Search Results - (( code application customization algorithm ) OR ( leave application optimization algorithm ))
Search alternatives:
- application optimization »
- customization algorithm »
- leave application »
- code application »
-
1
Predicting the optimum compositions of a transdermal nanoemulsion system containing an extract of Clinacanthus nutans leaves (L.) for skin antiaging by artificial neural network mo...
Published 2017“…Hence, ANN was found to be an effective tool for optimizing the nanoemulsion containing C. nutans leaves extract with efficacy to protect collagen from breakdown.…”
Get full text
Get full text
Get full text
Article -
2
-
3
Automated recognition of Ficus deltoidea using ant colony optimization technique
Published 2013“…At first, through image processing specified features are extracted from the Ficus deltoidea leaves such as vein, morphology and texture features and they construct a search space to be chosen for the optimal subset features that is selected by ACO algorithm as support vector machine (SVM) classify them. …”
Get full text
Get full text
Conference or Workshop Item -
4
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. However, for the non-intact leaves such as the deformed, partial and overlapped leaves that largely exist in practice, the global shape features are not efficient and these methods are not applicable.The dried leave parts and noise can degrade identification results and affect the quality of the extracted features which lead to poor classification results. …”
Get full text
Get full text
Thesis -
5
-
6
Expansion power system transmission using ant colony optimization: article / Izzataswad Ibrahim
Published 2015“…This paper presents an application of ant colony optimization (ACO) to optimization the expansion transmission in power system. …”
Get full text
Get full text
Article -
7
-
8
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation techniques allow the programmer to customize which part of the code to be obfuscated. …”
Get full text
Get full text
Thesis -
10
Recent advances in meta-heuristic algorithms for training multilayer perceptron neural networks
Published 2025“…The study also highlights bibliometric trends, identifies underexplored areas such as adaptive and hybrid algorithms, and emphasizes the practical application of MHAs in optimizing ANN performance. …”
Get full text
Get full text
Get full text
Article -
11
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
State of charge estimation for lithium-ion battery based on random forests technique with gravitational search algorithm
Published 2023Conference Paper -
13
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…This thesis focuses on developing Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks, where a large number of static nodes are supported by few mobile nodes in carrying out the sensing task. …”
Get full text
Get full text
Thesis -
14
-
15
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
Published 2017“…FPGA is chosen as the platform due to it does not have software overhead and is meant to be customized for real time applications. Most of the researches are done on the area of optimizing hardware resources to implement AES on FPGA. …”
Get full text
Get full text
Thesis -
16
An efficient channel coding and short preamble design for mission critical machine-type communication over wireless networks / Najib Ahmed Mohammed Ahmed
Published 2022“…In this study, an innovative architecture is proposed for mcMTC applications through PHY layer named Mission Critical WiFi (MC-WiFi) targeted at reducing the end-to-end (E2E) latency by minimizing the packet transmission time and improving the reliability by proposing a one preamble symbol Packet Detection and Channel Synchronization (PDCS) algorithm and implementing of polar codes in the wireless channel. …”
Get full text
Get full text
Get full text
Thesis -
17
Modeling forest fires risk using spatial decision tree
Published 2011Get full text
Get full text
Conference or Workshop Item -
18
Design of a reconfigurable computing platform
Published 2023“…The RCP is built to allow users with little or no knowledge of hardware design to program high performance computing applications that utilizes FPGA as the coprocessor. The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
Conference paper -
19
Nutrition Tracking Application Development
Published 2023“…The proposed mobile application will calculate and calibrate the required calories and macronutrients the user needs based on the the calculations algorithms in the code that calculates the Basal Metabolic Rate (BMR) of the user based on their personal biological metrics such as their age, weight, height and gender. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Secure payment parking system (SPS) with Excel database software / Syed Luqman Putra Syed Putra Zainol Alam
Published 2024“…This project addresses the need for an efficient and secure car parking solution, leveraging ESP32 and ESP32 CAM modules, infrared sensors, LEDs, and a custom mobile application developed with MIT App Inventor. …”
Get full text
Get full text
Student Project
