Search Results - (( developing function using algorithm ) OR ( system implementation re algorithm ))

Refine Results
  1. 1

    Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems by Homayouni, Seyed Mahdi

    Published 2008
    “…A genetic algorithm is developed to tune the membership functions (MFs) of input variables of GDF and GSF controllers. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Intelligent Optimization Systems for MaintenanceScheduling of Power Plant Generators by Ismail F.B., Randhawa G.S., Al-Bazi A., Alkahtani A.A.

    Published 2024
    “…The intelligent optimization models are developed using MATLAB and the developed intelligent algorithms are tested on a case study in a coal power plant located at minjung, Perak, Malaysia. …”
    Article
  3. 3

    Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.] by Mohd Khairuddin, Nurul Syahmina, Ahmadon, Fadzlin, Hashim, Madihah Hannani, Mohd Vauxhall, Nur Ain Emylia

    Published 2022
    “…Before the project can be used by the user, a functionality testing was done to test whether the system has been developed according to the requirement and to correct any mistakes and flaws that were detected during the testing. …”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Improving utility and recovery algorithms for adaptive real time system in multiprocessor environment by Ahmad, Idawaty

    Published 2012
    “…The Backward Recovery GPUAS (BR_GPUAS) algorithm is implemented in the multiprocessor environment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh by Seef Saadi , Fiyadh

    Published 2019
    “…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A backward recovery mechanism in preemptive utility accrual real time scheduling algorithm by Ahmad, Idawaty, Othman, Muhammad Fauzan

    Published 2010
    “…The decision to immediately abort the affected tasks is inefficient because aborted tasks produce zero utility causes the system to accrue lower utility. Approach: The proposed BRPUAS algorithm enabled the re-execution of the affected tasks rather than abortion to reduce the number of aborted task in the existing algorithm known as Abortion Recovery Preemptive Utility Accrual Scheduling (ARPUAS) algorithm that employed the AR mechanism. …”
    Get full text
    Get full text
    Article
  9. 9

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…A proof of concept mobile AR system is implemented as part of this thesis. Experiments and many evaluations are conducted to validate the proposed algorithms on iPhone. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Design and analysis of sequence generator module using eulerian path algorithm for DNA fragment assembly / Mustaqim Mohd Subri by Mohd Subri, Mustaqim

    Published 2013
    “…Based on comparison between timing analysis in DC and PT, it can be concluded that this system can be implemented with TC equals to 600ns period. …”
    Get full text
    Get full text
    Student Project
  12. 12
  13. 13

    A Comparison Of The Different Algorithms For Essential Tremor And Parkinson’s Disease Tremor Differentiation Based On Hand Tremor by Boey, Keen Huang

    Published 2018
    “…To assist specialist in making decisions when diagnosing the tremor, a tremor monitoring and differential diagnosis system is implemented using a wireless inertia measurement unit, to collect hand tremor data from patients and perform classifications of tremor. …”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15
  16. 16

    Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection by Al-Shanoon, Abdulrahman Abdulkareem Sattoori

    Published 2016
    “…The robotic hand system comprises a new algorithm for data extraction and signal processing analysis that are measured from an object re-gripping operation based on slip detection information. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda by Mohamad @ Hamza, Mohd. Azwan

    Published 2006
    “…Thus, the experiment has shown by utilizing both techniques (MMB and MLR), better prediction or essay assessment has been achieved compared to the one’s implemented using Fuzzy Logic and SLR Algorithm.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  20. 20

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Once an insecure condition occurs, new actions must be considered to restore the system to secure operation. The objective of this work is to introduce new algorithms that can enhance power system security inclusive of the remedial action (generation re-dispatch/load shedding) for any scale of power system operation as well as improving the existing ANN to solve the problem faced by power system security assessment. …”
    Get full text
    Get full text
    Thesis