Search Results - (( development programme extraction algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing by Ch'ng, Heng Sun

    Published 2007
    “…It is also designed for high performance and it exhibits a run-time complexity for an INSERT (or EXTRACT) queue operation that is constant. In order to utilize the high performance hardware priority queue module, modifications have to be made on the graph-based shortest path algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    VHDL Modelling of FECG Extraction from the Composite Abdominal ECG using Artificial Intelligence by Hasan, Muhammad Asfarul, Ibrahimy, Muhammad Ibn, Uddin, Md. Jasim, Hussain, Mohammed Sazzad, Reaz, Mamun Ibn

    Published 2009
    “…The purpose of this paper is to model the developed algorithms on FECG signal extraction using VHDL (very high speed integrated circuit hardware description language) for FPGA (field programmable gate array) implementation from the abdominal ECG signal using neural network approach is to provide efficient and effective ways of separating FECG signal and its nature. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Performance analysis of PSO MPPT for photovoltaic (PV) system during irradiance changes / Kharismi Burhanudin by Burhanudin, Kharismi

    Published 2018
    “…The hardware was tested using PV simulator (Chroma programmable 62000H DC power supply) to identify the output power extracted from the PV panel for each irradiance value.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Population genetic structure of Malayan Tapir (Tapirus indicus Desmarest) in Peninsular Malaysia by Lim, Qi Luan

    Published 2019
    “…A preliminary assessment of sex ratio was conducted using the data extracted from the tapir datasheets obtained from the Department of Wildlife and National Parks, Sungai Dusun Wildlife Conservation Centre and Zoo Negara; and aided with the developed sex-typing marker for those biological samples with unknown sex. …”
    Get full text
    Get full text
    Thesis