Search Results - (( developing partly normalization algorithm ) OR ( java application solar algorithm ))
Search alternatives:
- normalization algorithm »
- partly normalization »
- developing partly »
- application solar »
- java application »
- solar algorithm »
-
1
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
Get full text
Get full text
Final Year Project -
2
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
3
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
Get full text
Get full text
Article -
4
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Assistive technology : Sign language translation application for hearing-impaired communication / Muhammad Amin Naim Ab Karim
Published 2020“…The test has two parts, the first part was demographic questions and the second part was divided into four components and consists of 13 questions. …”
Get full text
Get full text
Thesis -
7
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
Article -
8
Automatic label removal from digitized weld radiographs
Published 2007“…An algorithm was developed to detect and remove labels printed onto weld radiographs before weld extraction algorithm or defect detection algorithm is applied. …”
Get full text
Get full text
Get full text
Article -
9
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
text::Thesis -
10
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Software requirement specification (SRS) document is the most crucial document in software development process. SRS is normally produced during the initial part of software development process and all subsequent steps in software development are influenced by the requirements. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis
Published 2017“…For modified image, the altered blocks should have higher error potential compred to the remaining part of the image. The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Besides, it really demands skill and experience on the part of simulation engineer. Today, tremendous efforts are made to develop Automatic History Matching algorithms. …”
Get full text
Get full text
Final Year Project -
13
The Anglerfish algorithm: a derivation of randomized incremental construction technique for solving the traveling salesman problem
Published 2019“…The combination of possible solutions are rather vast and often overwhelms the limited computational power. Smart algorithms have been developed to address this issue. …”
Get full text
Get full text
Article -
14
-
15
Space vehicles dynamics and control
Published 2011“…This book consists of two main parts main goal of the first part is to collect and develop new attitude algorithms that build up the different scenarios acted by a spacecraft starting from the orbit injection phase. …”
Get full text
Get full text
Get full text
Book -
16
Integration of fuzzy logic control algorithm in the development of optical fiber daylighting system for energy savings / Fuziah Sulaiman.
Published 2006“…The switch used Fuzzy Logic Control Algorithm for automated lighting and dimming control. …”
Get full text
Get full text
Thesis -
17
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
18
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
19
-
20
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
Get full text
Get full text
Thesis
