Search Results - (( developing nation method algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  2. 2
  3. 3

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Sentiment analysis on national cultural tourism using Linear Support Vector Machine (LSVM) / Nur Haida Hanna Samsuddin by Samsuddin, Nur Haida Hanna

    Published 2020
    “…In future, it is recommended to experiment with different algorithm or kernel of Support Vector Machine. The volume of data should be large as it can generate better result of classification method.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A novel computer-aided multivariate water quality index by Siong, Fong Sim, Teck, Yee Ling, Seng, Lau, Mohd Zuli, Jaafar

    Published 2015
    “…Unlike other conventional indexing methods, the algorithm calculates the index in a multivariate manner. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Development of Sense and Avoid system based on multi sensor integration for unmanned vehicle system by Legowo, Ari, Ramli, M. Faiz, Syafiq Shamsudin, Syariful

    Published 2016
    “…Subsequently, once the algorithms are put together, including maneuvers avoidance technique algorithm, the developed SAA system will be experimentally tested in order to validate and evaluate the overall capability of the system.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12
  13. 13

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Raw fingerprint images and filtered images (noise removal and enhancement) are tested to determine the efficiency of the algorithm developed. The improved algorithm has applied to 350 image samples obtained from National Institute of Standards and Technology (NIST). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Investigation of load variant under power distribution network reconfiguration using EPSO algorithm by Sulaima, Mohamad Fani, Wong, Kok Loong, Bohari, Zul Hasrizal, Mohd Nasir, Mohamad Na'im

    Published 2024
    “…Furthermore, the test result also indicated that the EPSO algorithm produced better results in terms of convergence time compared to the conventional PSO algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…Therefore, in this study SUREAutometrics is improvised using two MLE methods, which are iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm, named as SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Development of an integrated scheduling model for handling equipment in automated port container terminals by Sadeghian, Syed Hamidreza

    Published 2014
    “…To evaluate the performance of the developed model and solving method, numerical experiments are designed and the obtained results are reported and analyzed in this research. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development of Artificial Neural Network for lightning prediction under Malaysia environment: article / Jeremy AK Stewart Bedimbap by Stewart Bedimbap, Jeremy

    Published 2009
    “…In the proposed method, a three layer back-propagation neural network with Levenberg Marquardt algorithm has been developed and predict the output data for four hours in advanced. …”
    Get full text
    Get full text
    Article
  20. 20

    Low-light image analysis and contrast enhancement using gaussian process / Loh Yuen Peng by Loh , Yuen Peng

    Published 2018
    “…However, current studies in low-light fundamentally lack an indepth understanding of natural vision in low-light that would strengthen the development of effective algorithms. This has subsequently restricted the development of well-rounded systems that would aid in low-light environments, such as assistive systems, surveillance, and autonomous car driving. …”
    Get full text
    Get full text
    Thesis