Search Results - (( its application window algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…This thesis gives a systematic investigation of various MLP learning mainly Sliding Window (SW) learning mode which is treated as the adaptation of offline algorithms into online application Consequently this thesis reviews various offline algorithms including: batch backpropagation, nonlinear conjugate gradient, limited memory and full-memory Broyden, Fletcher, Goldfarb and Shanno algorithms and different forms of the latest proposed bimary ensemble learning. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact by Matori, A.N, Hassaballa, A. Haleem

    Published 2011
    “…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. The application of the three formulas showed a homogenous results specially when using Becker et al (1990) and Uliveri et al. (1994) algorithms. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Automatic algorithm applied for calculating thermal conductivity by transient plane source method by Jia, Zhijie, Yang, Liping, Cao, Chengcheng, Li, Huidong, Luo, Caiyun, Tao, Te, Zhong, Qiu, Xu, Zijun, Chen, Zezhong

    Published 2024
    “…As a thermal conductivity measurement method, Transient Plane Source (TPS) method has gained much popularity because of its broad applicability, short measurement times, high precision and simple sample preparation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels by Farajalla Ali, Nawafil Abdulwahab, Alshaikhli, Imad Fakhri Taha

    Published 2021
    “…This paper investigates the applicability of a proposed digital image algorithm for filling cracks in digitized paintings. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Application of minimax algorithm in dots and boxes game by Tan, Ah Hwa

    Published 2025
    “…The project successfully demonstrates the application of an enhanced Minimax algorithm to create a challenging and engaging AI opponent, effectively revitalizing the classic game by offering significant strategic depth through its advanced AI implementation and varied difficulty levels.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…We believe this reduction model with its tool geared towards Microsoft Windows 10 Professional operating system is a more efficient forensic tool for windows 10 64-bit professional than generic tools used and will open a path for OS-defined Forensic tools which will definitely be a delight to many investigators as it will hasten the examination phase of digital forensic process.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis