Search Results - (( java application matching algorithm ) OR ( changes realization based algorithm ))

Refine Results
  1. 1
  2. 2

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…However, Chinese language features are rich and fuzzy, and the training optimization of lip-reading model requires high GPU computation and storage, so it is difficult to realize large-scale application. Therefore, three knowledge distillation compression algorithms are proposed in this paper: Three different knowledge distillation compression algorithms, an offline model compression algorithm based on multi-feature transfer (MTOF), an online model compression algorithm based on adversarial learning (ALON), and an online model compression algorithm based on consistent regularization(CRON) to complete the compression of the Chinese character sequence output by the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Black widow optimization-based optimal PI-controlled wind turbine emulator by Premkumar K., Vishnupriya M., Babu T.S., Manikandan B.V., Thamizhselvan T., Ali A.N., Islam M.R., Kouzani A.Z., Parvez Mahmud M.A.

    Published 2023
    “…Finally, the proposed system is realized in real-time by hardware experimentations. …”
    Article
  9. 9

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Simultaneous controllers for stabilizing the frequency changes in deregulated power system using moth flame optimization by Peddakapu, kurukuri, Mohd Rusllim, Mohamed, Srinivasarao, P., Leung, Puiki

    Published 2022
    “…The performance of MFO-based 2DOF PID-FOPDN is evaluated against Cuckoo search (CS), Bat algorithm (BA), and Teaching learning-based optimization (TLBO) approaches in different contract scenarios of deregulated system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking by Ramalu, Tanaselan

    Published 2016
    “…Their main weakness is these algorithms always fail to track MPP and high oscillation occurs whenever the sunlight (irradiance) changes frequently. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    UiTM Transportation Unit bus trip scheduling system / Noorzawanah Ab Rahim by Ab Rahim, Noorzawanah

    Published 2009
    “…The proposed heuristic algorithm is based on the simple greedy search, that guide the search efficiently and able to find good solutions. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced-PID Control Based Antagonistic Control For Pneumatic Artificial Muscle Actuators by Tan, Ming Hui

    Published 2016
    “…Some past control algorithms on the positioning control of PAM mechanisms are discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Network reconfiguration using PSAT for loss reduction in distribution systems by Zehra, E.J.A., Moghavvemi, M., Hashim, M.M.I., Kashem, M.

    Published 2010
    “…Network reconfiguration in distribution system is realized by changing the status of sectionalizing switches, and is usually done for the purpose of loss reduction. …”
    Get full text
    Conference or Workshop Item
  18. 18

    Malaysia network transit route adviser system by Mohd Syafiq, Bachok

    Published 2010
    “…MANTRA using Dijkstra's Algorithm to realize these functions. frIANTRA 98% successfully to advice the tourist goes to the destination using Malaysia Transit.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…The current analysis tools and algorithms employed by the business organization were not designed to analyze the ever dynamic changes in taste and preferences of users when predicting the buying intent ion. …”
    Get full text
    Get full text
    Conference or Workshop Item