Search Results - (( developing function using algorithm ) OR ( post implementation based algorithm ))
Search alternatives:
- implementation based »
- developing function »
- post implementation »
- using algorithm »
-
1
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Get full text
Article -
4
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Article -
5
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…In the human gait model, three Machine Learning algorithms were used: Gaussian Process Regression, Support Vector Machine, and Decision Tree. …”
Get full text
Get full text
Thesis -
6
An intelligent adjustable spanner for automated engagement with multi-diameter bolts/nuts during tightening/loosening process using vision system and fuzzy logic
Published 2018“…The fuzzy logic-based decision-making algorithm is applied to the images resulting from the postprocessing stage in order to do a final decision on the diameter of the bolt/nut and approximate it to the nearest standards diameter. …”
Get full text
Get full text
Get full text
Article -
7
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. …”
Get full text
Get full text
Thesis -
8
Artificial neural network (ANN) as post-processing stage for chemically selective field effect transistor (CHEMFET) sensor selectivity based-on ion concentration / Nurhakimah Abd A...
Published 2016“…In this study, the sensor voltage response was acquired to act as input data while sample concentrations which set from 10"6 to 10"1 mol/L was used as target for training data. The sensor voltage response used has been measured and also generated based on CHEMFET sensor modeling by using MATLAB software. …”
Get full text
Get full text
Thesis -
9
Intentional Islanding Solution Based on Modified Discrete Particle Swarm Optimization Technique
Published 2023Conference Paper -
10
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
Get full text
Get full text
Thesis -
11
-
12
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
13
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
15
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
16
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
17
A Survey of metaheuristic approaches for curriculum based course timetabling problem
Published 2017“…Purpose - The aim of this paper is to explore approaches applied for solving CBCTT by presenting features of implementation related to it.The idea is to prepare references structure for future implementation.There are numerous surveys related to approaches in University course timetabling problem (UCTP) (Babaei, Karimpour, & Hadidi, 2014; Nandhini & Kanmani, 2009).Usually surveys that carried out involved post enrollment course timetabling problem (PECTT) and curriculum-based course timetabling problem (CBCTT) together in one literature. …”
Get full text
Get full text
Conference or Workshop Item -
18
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
19
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
Get full text
Get full text
Thesis -
20
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis
