Search Results - (( code application customization algorithm ) OR ( leave application optimization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Automated recognition of Ficus deltoidea using ant colony optimization technique by Ishak, Asnor Juraiza, Che Soh, Azura, Marhaban, Mohammad Hamiruce, Khamis, Shamsul, Ghasab, Mohammad Ali Jan

    Published 2013
    “…At first, through image processing specified features are extracted from the Ficus deltoidea leaves such as vein, morphology and texture features and they construct a search space to be chosen for the optimal subset features that is selected by ACO algorithm as support vector machine (SVM) classify them. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. However, for the non-intact leaves such as the deformed, partial and overlapped leaves that largely exist in practice, the global shape features are not efficient and these methods are not applicable.The dried leave parts and noise can degrade identification results and affect the quality of the extracted features which lead to poor classification results. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Expansion power system transmission using ant colony optimization: article / Izzataswad Ibrahim by Ibrahim, Izzataswad

    Published 2015
    “…This paper presents an application of ant colony optimization (ACO) to optimization the expansion transmission in power system. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation techniques allow the programmer to customize which part of the code to be obfuscated. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Recent advances in meta-heuristic algorithms for training multilayer perceptron neural networks by Al-Asaady, Maher Talal, Mohd Aris, Teh Noranis, Mohd Sharef, Nurfadhlina, Hamdan, Hazlina

    Published 2025
    “…The study also highlights bibliometric trends, identifies underexplored areas such as adaptive and hybrid algorithms, and emphasizes the practical application of MHAs in optimizing ANN performance. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques by Ceesay, Omar M.

    Published 2011
    “…This thesis focuses on developing Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks, where a large number of static nodes are supported by few mobile nodes in carrying out the sensing task. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes) by Low, Chiau Thian

    Published 2017
    “…FPGA is chosen as the platform due to it does not have software overhead and is meant to be customized for real time applications. Most of the researches are done on the area of optimizing hardware resources to implement AES on FPGA. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient channel coding and short preamble design for mission critical machine-type communication over wireless networks / Najib Ahmed Mohammed Ahmed by Najib Ahmed , Mohammed Ahmed

    Published 2022
    “…In this study, an innovative architecture is proposed for mcMTC applications through PHY layer named Mission Critical WiFi (MC-WiFi) targeted at reducing the end-to-end (E2E) latency by minimizing the packet transmission time and improving the reliability by proposing a one preamble symbol Packet Detection and Channel Synchronization (PDCS) algorithm and implementing of polar codes in the wireless channel. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Design of a reconfigurable computing platform by Papu J.J., See O.H.

    Published 2023
    “…The RCP is built to allow users with little or no knowledge of hardware design to program high performance computing applications that utilizes FPGA as the coprocessor. The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
    Conference paper
  19. 19

    Nutrition Tracking Application Development by Mohd Zaki, Ahmad Mustafa

    Published 2023
    “…The proposed mobile application will calculate and calibrate the required calories and macronutrients the user needs based on the the calculations algorithms in the code that calculates the Basal Metabolic Rate (BMR) of the user based on their personal biological metrics such as their age, weight, height and gender. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    Secure payment parking system (SPS) with Excel database software / Syed Luqman Putra Syed Putra Zainol Alam by Syed Putra Zainol Alam, Syed Luqman Putra

    Published 2024
    “…This project addresses the need for an efficient and secure car parking solution, leveraging ESP32 and ESP32 CAM modules, infrared sensors, LEDs, and a custom mobile application developed with MIT App Inventor. …”
    Get full text
    Get full text
    Student Project