Search Results - (( developing function using algorithm ) OR ( post implementation a algorithm ))
Search alternatives:
- developing function »
- post implementation »
- implementation a »
- using algorithm »
- a algorithm »
-
1
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…A general method for post-processing of field data with high order tetrahedra is presented. …”
Get full text
Get full text
Thesis -
4
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). …”
Get full text
Get full text
Article -
5
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). …”
Get full text
Get full text
Get full text
Article -
6
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…In the human gait model, three Machine Learning algorithms were used: Gaussian Process Regression, Support Vector Machine, and Decision Tree. …”
Get full text
Get full text
Thesis -
7
An intelligent adjustable spanner for automated engagement with multi-diameter bolts/nuts during tightening/loosening process using vision system and fuzzy logic
Published 2018“…Many filters and functions are applied in the image processing stage to efficiently get a clear border for the bolt/nut. …”
Get full text
Get full text
Get full text
Article -
8
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. …”
Get full text
Get full text
Thesis -
9
Artificial neural network (ANN) as post-processing stage for chemically selective field effect transistor (CHEMFET) sensor selectivity based-on ion concentration / Nurhakimah Abd A...
Published 2016“…In this study, the sensor voltage response was acquired to act as input data while sample concentrations which set from 10"6 to 10"1 mol/L was used as target for training data. The sensor voltage response used has been measured and also generated based on CHEMFET sensor modeling by using MATLAB software. …”
Get full text
Get full text
Thesis -
10
Intentional Islanding Solution Based on Modified Discrete Particle Swarm Optimization Technique
Published 2023Conference Paper -
11
Crosssover-first different evolution: a comprehensive post- Hoc analysis
Published 2017“…Implementation details explained clearly with a comprehensive post-hoc statistical analysis to support the algorithm. …”
Get full text
Get full text
Book -
12
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
13
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
Get full text
Get full text
Thesis -
14
-
15
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
16
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The proposed technique has improved the algorithm by incorporating an autonomous decision making, that makes the binarization technique a scale invariant algorithm. …”
Get full text
Get full text
Thesis -
17
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
18
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
Get full text
Get full text
Thesis -
19
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis
