Search Results - (( its implementation function algorithm ) OR ( based constructive method algorithm ))
Search alternatives:
- implementation function »
- its implementation »
- function algorithm »
- based constructive »
- method algorithm »
-
1
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
2
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
Get full text
Thesis -
4
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This project will be using Latent Semantic Analysis Algorithm to cope with comparisons of khutbah texts as it’s cover most of the requirement of the system. …”
Get full text
Get full text
Thesis -
5
Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
Published 2020“…In this algorithm, the Boolean function given with coefficients, n is equal to ten (10) and its degree, d is equal to six (6). …”
Get full text
Get full text
Get full text
Article -
6
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…In security system designs where data transmission must be properly encrypted to avoid eavesdropping and unwanted monitoring, the Hash Function is vital. In constructing the SHA-256 algorithm, high speed, compact size, and low power consumption are all factors to be taken into account for an efficient implementation. …”
Get full text
Get full text
Get full text
Proceeding -
7
IFS on the multi-fuzzy fractal space.
Published 2009“…More precisely, the most popular “fractal –based” algorithms for both representation and compression of computer images have involved some implementation of the method of Iterated Function Systems (IFS) on complete metric spaces. …”
Get full text
Get full text
Article -
8
Implementation of Symmetric Rank-One Methods for Unconstrained Optimization
Published 2010“…We prove that the new method possesses global convergence. The rate of convergence of such algorithms are also discussed. …”
Get full text
Get full text
Thesis -
9
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…This paper presents a genetic-algorithm-based fuzzy inference system for extracting highly comprehensible fuzzy rules to be implemented in human practices without detailed computation (hereafter denoted as GA-FIS). …”
Article -
10
Comparison Of Phylogenetic Trees Using Difference Distance Function Method
Published 2005“…This study is mainly about the construction of phylogenetic trees using for difference di stance functions methods. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The findings of the prototype showed a functional website and mobile application in which the digital display accurately displays readings in accordance with its intended purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Optimal overcurrent relay coordination in wind farm using genetic algorithm
Published 2015“…Many suggestions have been made and approaches implemented, however one of the most prominent methods is the use of Genetic Algorithm (GA) to improve the function and coordination of OCRs. …”
Get full text
Get full text
Thesis -
13
-
14
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
Get full text
Get full text
Thesis -
15
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The correlation-based feature selection (CFS) method was used to select representative WPD vector subset to eliminate redundancy before combining with other features. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
18
Training functional link neural network with ant lion optimizer
Published 2020“…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article
