Search Results - (( java application customization algorithm ) OR ( model verification method algorithm ))
Search alternatives:
- customization algorithm »
- verification method »
- java application »
- method algorithm »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
6
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
7
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The thesis was set to three objectives as follows; to develop a new augmentation algorithm of Simplex method from the existed augmentation studies; to integrate the superiorities of the QSM and BLSA algorithms that can enhance computational performance; to compare the performance of the new augmentation algorithm with the conventional Simplex, QSM and BLSA in reducing iteration number. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Effects of integration on the cost reduction in distribution network design for perishable products
Published 2014“…To solve the integrated model, a memetic algorithm (MA) is developed in this study. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…On analysing the distortion effect by means of numerical computation method, a commercial specialized simulation software Simufact.Welding was used in the development of the numerical model. …”
Get full text
Get full text
Thesis -
11
Verification of volume-of-fluid (VOF) simulation for thin liquid film applications
Published 2023“…This paper describes the application of the built-in Volume-of-Fluid (VOF) model in the commercial Computational Fluid Dynamics (CFD) software FLUENTTM and the verification of its accuracy. …”
Conference paper -
12
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
Get full text
Get full text
Article -
13
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Then, it is tested on the FPGA using the properties of hardware co-simulation method. The system verification is performed by simulating the hardware co-simulation for the metric value of the EXP-BET metric algorithm and compared against the manual calculation.…”
Get full text
Get full text
Thesis -
14
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
15
-
16
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…Moreover, one-class SVM can be robust recognition algorithm for ECG biometric verification if the sufficient number of biometric samples is available.…”
Get full text
Get full text
Conference or Workshop Item -
17
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…These models explain the dynamics of support seeking and provision behaviours and were evaluated using equilibria analysis and automatic logical verification approaches for 14 selected empirical cases. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…For the establishment of back-propagation algorithms, it does not only use Artificial Neural Network (ANN) model but also other techniques such as multiple regression analysis, dichotomous forecast method and error difference method. …”
Get full text
Get full text
Thesis -
19
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
