Search Results - (( identification implementation phase algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid by Mohd Zaid, Aishah Nabila

    Published 2024
    “…The design and implementation phase focus on prototype development, while the evaluation phase assesses classification performance. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system by Veerasamy, Veerapandiyan, Abdul Wahab, Noor Izzri, Vinayagam, Arangarajan, Othman, Mohammad Lutfi, Ramachandran, Rajeswari, Inbamani, Abinaya, Hizam, Hashim

    Published 2020
    “…This paper proposes a discrete wavelet transform (DWT)-based Graphical Language classifier algorithm for identification of high-impedance fault (HIF) in medium voltage (MV) distribution network of 13.8 kV. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee by Wan Roshdee, Wan Nur Alya Athirah

    Published 2024
    “…To solve this aim, several steps will be used including analysis, design, development, evaluation, and documentation phases. It also has been explained about the use of Convolutional Neural Network (CNN) in the project, the advantages and disadvantages, the implementation of the algorithm in various problem and similar works with the project title. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…Main contribution of ERP ALAR include user-centered, cheap, rugged and improved network access system through the following inputs: 3D implementation that takes care of landscape structures such as mountains and hills which is a common phenomenon in rural regions; extension of the current network coverage reach through the use of wireless relays; strategic deployment plan for the rural population through phase-by-phase deployment; cheap and affordable hardware implementation to minimize overall investment cost; and use of rugged WiFi hardware (IEEE 802.11 b) to minimize attention required on maintenance. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A new algorithm for human face detection using skin color tone by Zangana, Hewa Majeed, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…This system can detect a face regardless of the background of the picture, which is an important phase for face identification. The images used in this system are color images which give additional information about the images than the gray images provide. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An improved narrowband active noise control system without secondary path modelling based on the time domain by Mondal, Kuheli, Das, Saurav, Hamada, Nozomu, Haji Abu, Aminudin, Das, Saikat, Faris, Waleed Fekry, Toh, Hoong Thiam, Ahmad, Akij

    Published 2019
    “…The acoustic noise generated is further compounded by using secondary path identification which makes the system complex. There are several available ANC algorithms that do not require secondary path estimation for modifying the FxLMS algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
    Get full text
    Get full text
    Book Chapter
  14. 14

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…The use of feature selection as one of the important machine learning task is often disregarded in Writer Identification domain, with only a handful of studies implemented feature selection phase. …”
    Get full text
    Get full text
    Book Chapter
  15. 15

    Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik by Fadhilah, Mat Yamin

    Published 2002
    “…Several phases are involved, namely as the identification of the document's atributes, implementation of NN, identification of NN parameters and development of simple search engine prototype. 53 documents have been uploaded into the database for evaluation purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive by ARROFIQ, MUHAMMAD

    Published 2010
    “…A simulation model in MA TLAB/Simulink is developed using system identification technique to perform verification of the PLCbased intelligent controller of the PWM-driven VVVF algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Neighborhood and Machine Learning-Enabled Information Fusion Approach for the WSNs and Internet of Medical Things by Zard Ali Khan, Sheneela Naz, Rahim khan, Jason Teo, Abdullah Ghani, Mohammed Amin Almaiah

    Published 2022
    “…For this purpose, the proposed data aggregation scheme is divided into two phases: (i) identification of neighboring nodes, which is based on the MAC address and location, and (ii) data aggregation using k-mean clustering algorithm and Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Convolutional neural network based mobile application for poisonous mushroom detection by Amirul, Shazlin Nizam, Mohd Sabri, Norlina, Gloria, Jennis Tan, Redwan, Nurul Ainina, Zhiping, Zhang

    Published 2025
    “…There are 3 main phases of the research methodology, which cover the data collection and preprocessing, model design and implementation, and performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20