Search Results - (( developing function using algorithm ) OR ( its implementation level algorithm ))

Refine Results
  1. 1

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…Subsequently, the THF modelling scheme can be incorporated into an established real time NLFXLMS algorithm termed THF-NLFXLMS algorithm. The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…To overcome the issue of incompatible features to be combined, Wrapper Genetic Algorithm (GA) was implemented as the feature selection algorithm due to its ability to evaluate the features irrespective of which domain by masking the features with bit number. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…As the requirement of the Ant System Algorithm, the problem is modeled as a graph that can be used by the ant to deliver its pheromone. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Application of minimax algorithm in dots and boxes game by Tan, Ah Hwa

    Published 2025
    “…The project successfully demonstrates the application of an enhanced Minimax algorithm to create a challenging and engaging AI opponent, effectively revitalizing the classic game by offering significant strategic depth through its advanced AI implementation and varied difficulty levels.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…This project is developed by using Waterfall Model methodology as it’s the most direct model that is suitable for developing a system which consist of 5 phases which are Requirement Analysis, Design, Implementation, Testing and Maintenance. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Harmony search-based robust optimal controller with prior defined structure by Rafieishahemabadi, Ali

    Published 2013
    “…The second level compnses of two HS optimization algorithms developed and coded for robust stability examinations. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  13. 13

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…These results indicate the developed of KMS achieved level good and suitable for use category and does not need revision. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions by Gerhana, Yana Aditia

    Published 2025
    “…These results indicate the developed of KMS achieved level good and suitable for use category and does not need revision. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Development of committee machine models for multiple response optimization problems by Golestaneh, Seyed Jafar

    Published 2014
    “…Final conclusion shows that comparison between the results of Committee Machine and its experts in case studies indicate that Global Desirability of CM is equal to or higher than its experts, and proposed algorithm can be applied to solve different MRO problems in industry and scientific areas.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Unified neural network controller of series active power filter for power quality problems mitigation by Ghazanfarpour, Behzad

    Published 2013
    “…In order to enhance the response time of series APF, two of the most well known learning algorithms are investigated in this work. First, Widrow-Hoff algorithm is examined and its constant learning rate is modified by adding an adaptive learning rule to change the learning rate value. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    The identification of alcohol percentage limit in halal food using fuzzy logic by Mohd Ali, Jarinah, Othman, Suhaili, Ahmad Fadzillah, Nurrulhidayah, Abd. Rahman, Norliza

    Published 2021
    “…The algorithm will be developed to determine the permissibility level in such a way that it can identify the status of both the food and drinks containing alcohol whether it complies with JAKIM’s standard or not based on the percentage. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    Inventory tracker with estimation by Beh, Wei Jun

    Published 2024
    “…Since its development, the app has been thoroughly tested and has successfully demonstrated its core functionalities, including user authentication, transaction management, and inventory operations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis