Search Results - (( its implementation using algorithm ) OR ( basic implementation developing algorithm ))

Refine Results
  1. 1

    Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman by Abd Rohaman, Muhammad Syurahbil

    Published 2020
    “…Basic Theta* is implemented in the game using grid-based map representation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
    Get full text
    Learning Object
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences by M. Othman, Razib, Deris, Safaai, Md. IIlias, Rosli

    Published 2008
    “…The genetic similarity algorithm is implemented in the Gene Ontology browser named basic UTMGO to overcome the weaknesses of the existing Gene Ontology browsers which use a conventional approach based on keyword matching. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli by Ramli, Muhammad Harith

    Published 2017
    “…There are five general steps implemented to develop the prototype. From the testing conducted, it shows that Bat algorithm produced moderate performance towards gliomas grading and segmentation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…The ultrasonic sensor used is 40 kHz of its frequency and 125o of its beam angle. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    Visual tracking and servoing of human face for robotic head Amir-II by Shafie, Amir Akramin, Iqbal, Aseef, Khan, Md. Raisuddin

    Published 2010
    “…The robotic head tracks the human face within the field-of-vision (FOV) while the servoing mechanism ensures the detected human face remains at the center of its FOV. The algorithm developed in this research utilizes the capability offered by scientific computing program MATLAB along with its Image Processing Toolbox. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Collaborative recommender system for online jewelry store by Hon, Morris Mao Ning

    Published 2015
    “…The algorithm under collaborative filtering approach that been used in this project is called slope one algorithm which basically works by predicting user’s preference based on other user’s rating history on specific items in the system. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14

    Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim by Hashim, Hazwani

    Published 2014
    “…Here, specific transition matrix of FACS in CFB is developed and its basic properties which relates to Perron-Frobenius theorem are investigated. …”
    Get full text
    Get full text
    Thesis
  15. 15

    IMPLEMENTATION OF ADVANCED PROCESS CONTROL FOR FLOW CONTROL APPLICATION by ROSLI, NURFATIHAH SYALWIAH

    Published 2013
    “…A general MPC control algorithm is developed using MATLAB/Simulink Toolboxes. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm by Obaid, Zeyad Assi, Sulaiman, Nasri, Hamidon, Mohd Nizar

    Published 2009
    “…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Implementation of MRAC, SVMPC and PID control based on direct digital control application for dc servomotor by Mohamad Saleh, Saleha

    Published 2005
    “…The computer is connected to MS150 Modular Servo System via AX5412 data acquisition card and Microsoft Visual Basic 6.0 is used to conduct the experiment. Field-testing is implemented to compare the results between the original and modified system within three types of controller. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
    Get full text
    Get full text
    Thesis