Search Results - (( developing formative (patterns OR pattern) algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing formative »
- validation using »
- java validation »
- using algorithm »
-
1
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
2
Handwritten character recognition system for online learning using Recurrent Neural Network (RNN) / Nur Nabilah Shafiqah Rosli
Published 2022“…The purpose of this research to develop handwritten character recognition system by using Recurrent Neural Network (RNN) algorithm. …”
Get full text
Get full text
Student Project -
3
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021Get full text
Get full text
Conference or Workshop Item -
4
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
Get full text
Get full text
Thesis -
5
Land Use Changes in Jeli, Kelantan
Published 2013“…In this thesis, a study on land use change pattern in Jell is been given a focus as part of tool for land planning and development. …”
Get full text
Undergraduate Final Project Report -
6
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…(c) To study how constructed patterns and trends generate informed decisions on resource allocation for circulation function by using cluster analysis, frequency statistics, averages and aggregates and market basket analysis algorithm. …”
Get full text
Get full text
Thesis -
7
Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor
Published 2018“…The results obtained in .SAT file format show the algorithm generated feature volume, feature type and results obtained in .TXT file format show the quantitative values of features volume.…”
Get full text
Get full text
Article -
8
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
10
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
11
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…A study of local electricity structure shows that the individual user's consumption pattern is not a responsible one which leaves opportunity for policy makers to introduce new habit formation programmes like variable time pricing etc. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
13
Trajectory planning and simulation for 3d printing process
Published 2022“…Development of the simulator was started with the development of STL file reader to extract the triangular facets’ vertices from a STL file in ASCII format. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change
Published 2014“…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
Get full text
Get full text
Thesis -
15
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Geometrical and dimensional defect evaluation of cold forged AA6061 propeller blade
Published 2013“…In addition, the defect was predicted by investigating the design parameters and its effect on the material flow pattern. Comparison between the simulation result and the fabricated pin head show a geometrically similar pattern. …”
Get full text
Get full text
Thesis -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
18
Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz
Published 2020“…Next, the system was successfully developed by implementing the best CNN model as a classifier. …”
Get full text
Get full text
Thesis -
19
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
20
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
