Search Results - (( its implementation conversion algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implementation conversion »
- conversion algorithm »
- its implementation »
- implication based »
- java implication »
-
1
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
2
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…The hill climbing algorithm is the most common method of MPPT due to its simplicity, ease of implementation, and good performance. …”
Get full text
Get full text
Thesis -
3
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…This project proposes to design an iterative method of RIPEMD-160 in order to investigate the security algorithm and its implementation. Besides that, iterative methods also used to improve the frequency, power and are requirements performance of RIPEMD-160 hash function. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
4
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Grey Wolf optimization based power management strategy for battery storage of dfig-wecs in standalone operating mode
Published 2023Conference Paper -
7
-
8
-
9
Video image processing for traffic analysis
Published 1992“…Although the performance of the implementation algorithms needs to be further assesed, the preliminary results have demonstrated the success of collecting data for vehicle counts, speeds and headways with reasonable accuracy.…”
Get full text
Get full text
Get full text
Article -
10
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…Due to its significant function, whereby a conversion of manual procedure into a web based module is necessary, this module will be effective and brings benefits to the authorities, Halal logistic service providers and also users.…”
Get full text
Get full text
Thesis -
11
Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach
Published 2022“…The strategies applied showed that the final accuracy obtained through the training after implementing a modification in the algorithm is at 81% accuracy rate compared to the basic model that recorded its final accuracy at 79% accuracy rate. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Design and implementation of a single-phase to three-phase space-vector pwm-based matrix converter system for induction motor drives
Published 2016“…The project attained all its objectives with unique findings.…”
Get full text
Get full text
Thesis -
13
Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification
Published 2023“…The Viola-Jones algorithm is then used for face detection on the processed grayscale images. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
15
-
16
Mapping the spatial distribution and changes of oil palm land cover using an open source cloud-based mapping platform
Published 2019“…The Remote Ecosystem Monitoring Assessment Pipeline (REMAP) provides a cloud computing platform that hosts an open-source stacked Landsat data that allows land cover classification to be implemented using a built-in random forest supervised machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…These issues become particularly critical for big data transmission due to its own individual overhead causes. Moreover, multiple executions of distinct security algorithms for maintaining confidentiality and integrity reduce throughput and add a large number of additional bits as security overhead that hampers the robustness against data loss. …”
Get full text
Get full text
Article -
18
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…This helps to facilitate semi-skillful users to implement the tree counting algorithms. Users are required to input three parameters which are, image resolution, planting distance of oil palm trees as well as the diameter of oil palm crown, in order to operate the interface. …”
Get full text
Get full text
Thesis -
19
-
20
Developing individualised therapy for colistin through application of pharmacokinetic model tailored for critically ill Malaysian patients utilizing the HPLC-FLD
Published 2025“…The colistin pharmacokinetic model was then implemented for individual patient therapeutic drug dose optimisation. …”
Get full text
Get full text
Thesis
