Search Results - (( java application optimisation algorithm ) OR ( re extraction method algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…However, the AANN approach does not replace traditional analysis methods, while these methods are still needed at the initial step of the approach. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Palm vein recognition using scale invariant feature transform with RANSAC mismatching removal by Shi Chuan, Soh, M. Z., Ibrahim, Marlina, Yakno, D.J., Mulvaney

    Published 2017
    “…CASIA Multi Spectral Palm Print Image database is used for this re-search. Scale Invariant Feature Transform (SIFT) and RANSAC mismatching removal will be adopted for vein extraction and point feature matching with Eu-clidean Distance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    A new teaching learning artificial bee colony based maximum power point tracking approach for assessing various parameters of photovoltaic system under different atmospheric condit... by Dokala Janandra, Krishna Kishore

    Published 2024
    “…In order to ascertain the effectiveness of the proposed methods, the proposed methods have been compared with other studied methods. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Integration of filter-less unified power quality conditioner (UPQC) control scheme with solar photovoltaic and battery energy storage system / Muhammad Alif Mansor by Mansor, Muhammad Alif

    Published 2023
    “…However, some drawback exists in this traditional SRF method they involve a phase lock loop (PLL) for reference signal extraction, which can cause large amplitude and phase errors and, as a result, can lead to poor voltages and currents compensation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimization of Microbial Electrolysis Cell for Sago Mill Wastewater Derived Biohydrogen via Modeling and Artificial Neural Network by Mohamad Afiq, Mohd Asrul

    Published 2023
    “…Model validity describes the first sub-objective, which is to solve the complexity of the nonlinear interaction of multiple MEC input variables related to the hydrogen production rate response using artificial neural networks (ANN) before validating the mathematical modeling results by comparing experimental data with the predicted substrate concentration profile and hydrogen production rate profile based on the re-estimated input values of the model parameters using single-objective optimization based on the nonlinear convex method using gradient descent algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
    Get full text
    Get full text
    Thesis