Search Results - (( developing system across algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Modification of a commercial PWM sprayer control system for precision farming application by Shahemabadi, Ali Rafiei, Moayed, Majid Javid

    Published 2008
    “…An algorithm was developed to vary application rate across the booms with computing the best possible combinations of pulse width at the optimal boom through the computer control program for nozzles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Distributed Video Tracking by Phon, Thamiet Saukeaw

    Published 2018
    “…This project is conducted to test out the distributed video tracking system in surveillance monitoring. The main objective of this project is to develop an algorithm to track a target based on the target parameters across multiple camera in an integrated embedded camera platform. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Two-factor authentication smart entryway using modified LBPH algorithm by Ayop, Zakiah, Othman, Nur Fadzilah, Anawar, Syarulnaziah, Wan Mohamad Rosdi, Wan Mohamad Hariz, Looi, Wei Hua

    Published 2024
    “…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid. by Abdul Khalid, Noor Elaiza

    Published 2010
    “…For this purpose, two algorithm are has been developed to automatically detect the OC and IC. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…In order to support diversity of smart grid traffics, a contextual aware based Quality of Service (QoS) management system is needed to be introduced across the entire grid so that the system is aware of the changing context for each traffic. …”
    text::Thesis
  9. 9
  10. 10

    Survey on job scheduling mechanisms in grid environment by S. M., Argungu, Che Mohamed Arif, Ahmad Suki, Omar, Mohd Hasbullah

    Published 2015
    “…Grid systems provide geographically distributed resources for both computational intensive and data-intensive applications.These applications generate large data sets.However, the high latency imposed by the underlying technologies; upon which the grid system is built (such as the Internet and WWW), induced impediment in the effective access to such huge and widely distributed data.To minimize this impediment, jobs need to be scheduled across grid environments to achieve efficient data access.Scheduling multiple data requests submitted by grid users onto the grid environment is NP-hard.Thus, there is no best scheduling algorithm that cuts across all grids computing environments.Job scheduling is one of the key research area in grid computing.In the recent past many researchers have proposed different mechanisms to help scheduling of user jobs in grid systems.Some characteristic features of the grid components; such as machines types and nature of jobs at hand means that a choice needs to be made for an appropriate scheduling algorithm to march a given grid environment.The aim of scheduling is to achieve maximum possible system throughput and to match the application needs with the available computing resources.This paper is motivated by the need to explore the various job scheduling techniques alongside their area of implementation.The paper will systematically analyze the strengths and weaknesses of some selected approaches in the area of grid jobs scheduling.This helps researchers better understand the concept of scheduling, and can contribute in developing more efficient and practical scheduling algorithms.This will also benefit interested researchers to carry out further work in this dynamic research area.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Model Predictive Control Design for f Nonlinear Four-Tank System by Ansarpanahi, Shadi

    Published 2008
    “…This problem appears to be one of the most important and practical designs of nonlinear system in process control. In this thesis, besides good performance, the algorithm enjoys from relative simplicity and faster response in compare with the algorithms developed in other previous works. …”
    Get full text
    Get full text
    Thesis
  12. 12

    3D face registration across pose variation and facial expression using cross profile alignment by Anuar, Laili Hayati

    Published 2011
    “…Thus, as the first step prior face registration, the thesis proposed a novel nose tip region detection algorithm using localized point signature, developed specially to locate the nose tip region across various facial variation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The functionalities of existing systems across the members in the group are wrapped and introduce in the IIMA as services. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Moth Flame Optimization Algorithm including Renewable Energy for Minimization of Generation & Emission Costs in Optimal Power Flow by Alam, Mohammad Khurshed, Mohd Herwan, Sulaiman, Ferdowsi, Asma, Sayem, Md. Shaoran, Khair, Nazmus Sakib

    Published 2022
    “…This problem must be overcome to achieve the goals while keeping the system stable. Moth Flame Optimization (MFO), a recently developed metaheuristic algorithm, will be used to solve objective functions of the OPF issue for combined cost and emission reduction in IEEE 57-bus systems with thermal and stochastic wind-solar-small hydropower producing systems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil by Jamli, Mohd Radhi Fauzan, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…Future work entails enhancing system robustness through comprehensive contingency planning, real-time data integration, and algorithmic optimization, with a focus on refining the genetic algorithm and exploring parallel processing techniques to further enhance efficiency and scalability.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Genetic algorithm optimization of product design for environmental impact reduction / Julirose Gonzales by Julirose , Gonzales

    Published 2018
    “…This incited the need to develop product management systems which focus on minimizing a product’s impact across its life cycle. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges by John Deutero, Kisoi, Norfadzlan, Yusup, Syahrul Nizam, Junaini

    Published 2025
    “…Metaheuristic algorithms have emerged as promising techniques for optimizing human activity recognition (HAR) systems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Comparative study of some symmetric ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2014
    “…There are various symmetric cryptographic algorithms such as KASUMI cipher, SNOW cipher, ZUC cipher, and AES cipher have been developed for achieving secure mobile communication systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper