Search Results - (( development programme optimisation algorithm ) OR ( java data collection algorithm ))
Search alternatives:
- optimisation algorithm »
- collection algorithm »
- programme »
- java »
-
1
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…To simulate the physical removal of material during machining, a finite element model is designed to represent a thin walled workpiece. The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
2
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…To simulate the physical removal of material during machining, a finite element model was designed to represent a thin walled workpiece. The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
3
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Thesis -
4
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Get full text
Thesis -
5
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…After that, the algorithm proceeds to Group Allocation Stage in a round robin optimisation. …”
Get full text
Get full text
Get full text
Thesis -
6
Using genetic algorithms to optimise land use suitability
Published 2012Get full text
Get full text
Thesis -
7
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. …”
Get full text
Get full text
Monograph -
8
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. …”
Get full text
Get full text
Get full text
Article -
9
Human activity recognition via accelerometer and gyro sensors
Published 2023“…Lastly, the project paves the way for establishment of standardized dataset, with streamlined data collection, data annotation and data storage, and allow comparative research and benchmarking.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Implementation of luo-rudi phase 1 cardiac cell excitation model in FPGA
Published 2017“…By implementing the constructed algorithm into the high performance FPGA system, a new real-time simulation-based analysis technique of cardiac electrical excitation has been successfully developed.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…These cognitive maps are then stored in a data warehouse and ready to collect anytime for analytics purposes. …”
Get full text
Get full text
Thesis -
14
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…The second-level learner uses logistic regression (LR) to aggregate the final prediction output. The landslide data together with its conditioning factors (feature variables) collected from three districts in the Central Java Province, Indonesia, has been used as the case study for the LSM. …”
Conference Paper -
15
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. …”
Get full text
Get full text
Get full text
Article -
16
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
17
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
19
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Three-dimensional structure of Human Epididymis Protein 4 (HE4): a protein modelling of an ovarian cancer biomarker through in silico approach
Published 2024“…PROCHECK and ERRAT programmes were employed to assess the structure quality. …”
Get full text
Get full text
Get full text
Get full text
Article
