Search Results - (( developing developing function algorithm ) OR ( its implementation phase algorithm ))

Refine Results
  1. 1

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…This project is developed by using Waterfall Model methodology as it’s the most direct model that is suitable for developing a system which consist of 5 phases which are Requirement Analysis, Design, Implementation, Testing and Maintenance. …”
    Get full text
    Get full text
    Thesis
  4. 4

    The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Siddiqui, Sumrana, Sarkar, Rashel

    Published 2024
    “…A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section
  6. 6

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…Finally, the system is being developed in the Implementation Phase. The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section
  7. 7

    Estimation of photovoltaic models using an enhanced Henry gas solubility optimization algorithm with first-order adaptive damping Berndt-Hall-Hall-Hausman method by Ramachandran, Murugan, Sundaram, Arunachalam, Ridha, Hussein Mohammed, Mirjalili, Seyedali

    Published 2024
    “…EHGSOAdBHHH exhibits outstanding accordance with attained experimental data compared with other algorithms, and its superiority is validated using several statistical criteria.…”
    Get full text
    Get full text
    Article
  8. 8

    Development of committee machine models for multiple response optimization problems by Golestaneh, Seyed Jafar

    Published 2014
    “…Final conclusion shows that comparison between the results of Committee Machine and its experts in case studies indicate that Global Desirability of CM is equal to or higher than its experts, and proposed algorithm can be applied to solve different MRO problems in industry and scientific areas.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Design and implementation of a single-phase to three-phase space-vector pwm-based matrix converter system for induction motor drives by Velu, Vengadeshwaran

    Published 2016
    “…Poly phase devices such as three phase induction motors have many advantages compared to its single phase counter parts in terms of performance efficiency and load characteristics. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad... by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…The CISOS integrates the element of Chaotic Local Search and cloning into the original SOS algorithm. The performance of proposed CISOS technique has been assessed by using various benchmark test functions in terms of its ability to find the actual global minimum point of the test functions as well as the computational time required to find the minimum point. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Unified neural network controller of series active power filter for power quality problems mitigation by Ghazanfarpour, Behzad

    Published 2013
    “…In order to enhance the response time of series APF, two of the most well known learning algorithms are investigated in this work. First, Widrow-Hoff algorithm is examined and its constant learning rate is modified by adding an adaptive learning rule to change the learning rate value. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Speed Performance Improvement Of Three-Phase Induction Motor Drives Using Adaptive Sliding Mode Controller by Mohd Aziri, Muhammad Hasif

    Published 2020
    “…The modified classical sliding mode control (SMC) algorithm is developed based on the conventional robust controller with the adaption of switching gain and discontinuous sigmoid functions to eliminate the undesirable chattering phenomenon. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The development of embedded vision system is divided into two major phases which are the hardware integration and the software development. …”
    Get full text
    Thesis
  15. 15

    Inventory tracker with estimation by Beh, Wei Jun

    Published 2024
    “…Since its development, the app has been thoroughly tested and has successfully demonstrated its core functionalities, including user authentication, transaction management, and inventory operations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…Nevertheless, AC is not required for LCM if the original multi-spectral image is used. The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Classification and visualization of Malaysian fast food restaurant chain based on twitter sentiment analysis / Muhammad Hafeez Hakimi Muhd Zahidi Ridzuan by Muhd Zahidi Ridzuan, Muhammad Hafeez Hakimi

    Published 2023
    “…The methodology used in this project is known as the Modified Waterfall Model, which consists of four primary phases: requirement analysis, design, implementation, and testing. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…WPT system had been developed to support electrical energy from solar PV. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Mathematical model for predicting the performance of photovoltaic system with delayed solar irradiance by Siti Nurashiken, Md Sabudin

    Published 2023
    “…The numerical solution is obtained by adopting the Runge Kutta method coupled with a parameter fitting technique, the Nelder Mead algorithm, which is implemented by using MATLAB software. …”
    Get full text
    Get full text
    Thesis