Search Results - (( development using coefficient algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- coefficient algorithm »
- development using »
- using coefficient »
- validation using »
- java validation »
- using algorithm »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
3
Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm
Published 2018“…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
Get full text
Article -
4
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
5
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
7
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
8
Determination Of Heat Transfer Coefficients In Heat Exchangers By Genetic Algorithm
Published 2010“…Genetic algorithm (GA), developed by John Holland in the 1970s, is gaining widespread attention throughout the years. …”
Get full text
Get full text
Final Year Project -
9
Standard equations for predicting the discharge coefficient of a modified high-performance side weir
Published 2017“…In practical situations, it is preferred to predict the discharge coefficient with simple equations. The goal of this study is to develop accurate standard equations for use in predicting the discharge coefficient of a high-performance, modified triangular side weir. …”
Get full text
Get full text
Article -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Forest mapping in Peninsular Malaysia using Random Forest and Support Vector Machine Classifiers on Google Earth Engine
Published 2023“…The accuracy assessment test using the Kappa coefficient resulted in a value of 0.7893 for the RF algorithm and 0.6328 for the SVM algorithm for the year 2010. …”
Get full text
Get full text
Get full text
Article -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
13
An algorithm for positive solution of boundary value problems of nonlinear fractional differential equations by Adomian decomposition method
Published 2016“…In the proposed algorithm the boundary conditions are used to convert the nonlinear fractional differential equations to an equivalent integral equation and then a recursion scheme is used to obtain the analytical solution components without the use of undetermined coefficients. …”
Get full text
Get full text
Get full text
Article -
14
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The objective of this study is to develop an algorithm based on the aerosol optical thickness (AOT) for mapping PM1 0 using digital camera and satellite imageries. …”
Get full text
Get full text
Thesis -
15
Stack-run adaptive wavelet image compression using wavelet packets
Published 2007“…We report on the development of an adaptive wavelet image coder based on stack-run representation of the quantized coefficients. …”
Get full text
Article -
16
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
17
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
20
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
