Search Results - (( developing developing function algorithm ) OR ( _ implementation level algorithm ))
Search alternatives:
- developing developing »
- implementation level »
- developing function »
- function algorithm »
- _ implementation »
- level algorithm »
-
1
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
2
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
Get full text
Get full text
Thesis -
3
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
Get full text
Get full text
Thesis -
4
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…To overcome the issue of incompatible features to be combined, Wrapper Genetic Algorithm (GA) was implemented as the feature selection algorithm due to its ability to evaluate the features irrespective of which domain by masking the features with bit number. …”
Get full text
Get full text
Thesis -
5
Application of minimax algorithm in dots and boxes game
Published 2025“…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…At the algorithmic level, several approaches for solving the pose estimation problem are compared in terms of their neural implementability. …”
Get full text
Get full text
Thesis -
8
Computer control of batch process plant (software development)
Published 1995“…The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
Get full text
Get full text
Student Project -
9
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…This makes the scrambled images difficult to decode thus providing a high level of security protection for the images. The algorithm can be applied in the real-time applications since it is a straightforward process and easily implemented.…”
Get full text
Get full text
Get full text
Article -
10
A FUZZY LOGIC ALGORITHM FOR HEART RATE MONITORING
Published 2014Get full text
Get full text
Final Year Project -
11
Design of a floating point unit for 32-bit 5 stage pipeline processor
Published 2020“…The development project will start by studying the algorithm of addition on floating point numbers. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Correlation Feature Selection Weighting Algorithms for Better Support Vector Classification: An Empirical Study
Published 2020“…Feature selections based on correlation studies are incorporated into the proposed formulations for the weighting portions of the objective functions for SVM. Proposed cfsw-SVM algorithms are then developed. …”
Get full text
Get full text
Get full text
Article -
13
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
14
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
16
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…In multi-part-type and re-entrant production systems the priority of production as well as the production rate for each part type is determined by production control systems. A genetic algorithm is developed to tune the membership functions (MFs) of input variables of GDF and GSF controllers. …”
Get full text
Get full text
Thesis -
17
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. Moreover, this work is extended to integrate the SPX crossover operator with the adaptive ARDE algorithm in a new way of implementation in order to make the adaptive ARDE algorithm satisfy both the global and local search requirements. …”
Get full text
Get full text
Thesis -
18
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…The GA process (Inter Loop GA), crossover operator (Fix Multiple Point Crossover), mutation operator (Random Discrete Mask Mutation) and fitness function (Constraint Fitness and Gate Optimization Fitness) were developed in this research. …”
Get full text
Get full text
Thesis -
19
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…Algebraic functions are the primitives that strengthen the cryptographic algorithms to ensure confidentiality of data and information. …”
Get full text
Get full text
Article -
20
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis
