Search Results - (( developing partly normalization algorithm ) OR ( java application solar algorithm ))

Refine Results
  1. 1

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system by Guichi, Amar, Talha, Abdelaziz, Berkouk, El Madjid, Mekhilef, Saad, Gassab, Samir

    Published 2018
    “…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
    Get full text
    Get full text
    Article
  4. 4

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Assistive technology : Sign language translation application for hearing-impaired communication / Muhammad Amin Naim Ab Karim by Ab Karim, Muhammad Amin Naim

    Published 2020
    “…The test has two parts, the first part was demographic questions and the second part was divided into four components and consists of 13 questions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article
  8. 8

    Automatic label removal from digitized weld radiographs by Soo, Say Leong, Ratnam, Mani Maran, Samad, Zahurin, Khalid, Mohd. Ashhar

    Published 2007
    “…An algorithm was developed to detect and remove labels printed onto weld radiographs before weld extraction algorithm or defect detection algorithm is applied. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  10. 10

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Software requirement specification (SRS) document is the most crucial document in software development process. SRS is normally produced during the initial part of software development process and all subsequent steps in software development are influenced by the requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis by Gunawan, Teddy Surya, Mohammad Hanafiah, Siti Amalina, Kartiwi, Mira, Ismail, Nanang, Za'bah, Nor Farahidah, Nordin, Anis Nurashikin

    Published 2017
    “…For modified image, the altered blocks should have higher error potential compred to the remaining part of the image. The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…Besides, it really demands skill and experience on the part of simulation engineer. Today, tremendous efforts are made to develop Automatic History Matching algorithms. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    The Anglerfish algorithm: a derivation of randomized incremental construction technique for solving the traveling salesman problem by Pook, Mei Foong, Ramlan, Effirul Ikhwan

    Published 2019
    “…The combination of possible solutions are rather vast and often overwhelms the limited computational power. Smart algorithms have been developed to address this issue. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Space vehicles dynamics and control by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…This book consists of two main parts main goal of the first part is to collect and develop new attitude algorithms that build up the different scenarios acted by a spacecraft starting from the orbit injection phase. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16

    Integration of fuzzy logic control algorithm in the development of optical fiber daylighting system for energy savings / Fuziah Sulaiman. by Sulaiman, Fuziah

    Published 2006
    “…The switch used Fuzzy Logic Control Algorithm for automated lighting and dimming control. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
    Get full text
    Get full text
    Thesis