Search Results - (( java application optimisation algorithm ) OR ( re extraction method algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- extraction method »
- java application »
- method algorithm »
- re extraction »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
-
4
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…However, the AANN approach does not replace traditional analysis methods, while these methods are still needed at the initial step of the approach. …”
Get full text
Get full text
Thesis -
5
Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution
Published 2011“…However, WSE was the best method for the RE approach with the accuracy of 92%. …”
Get full text
Get full text
Get full text
Research Report -
6
Automated detection of microaneurysm for fundus images
Published 2016Get full text
Get full text
Get full text
Proceeding -
7
Automatic spinal deformity detection based on neural network
Published 2003Get full text
Get full text
Book Section -
8
Palm vein recognition using scale invariant feature transform with RANSAC mismatching removal
Published 2017“…CASIA Multi Spectral Palm Print Image database is used for this re-search. Scale Invariant Feature Transform (SIFT) and RANSAC mismatching removal will be adopted for vein extraction and point feature matching with Eu-clidean Distance. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
9
A new teaching learning artificial bee colony based maximum power point tracking approach for assessing various parameters of photovoltaic system under different atmospheric condit...
Published 2024“…In order to ascertain the effectiveness of the proposed methods, the proposed methods have been compared with other studied methods. …”
Get full text
Get full text
Thesis -
10
-
11
Application of slantlet transform based support vector machine for power quality detection and classification
Published 2015“…Finally, sensitivity of the proposed algorithm under noisy con-dition is investigated in this paper.…”
Get full text
Get full text
Get full text
Article -
12
Integration of filter-less unified power quality conditioner (UPQC) control scheme with solar photovoltaic and battery energy storage system / Muhammad Alif Mansor
Published 2023“…However, some drawback exists in this traditional SRF method they involve a phase lock loop (PLL) for reference signal extraction, which can cause large amplitude and phase errors and, as a result, can lead to poor voltages and currents compensation. …”
Get full text
Get full text
Thesis -
13
Optimization of Microbial Electrolysis Cell for Sago Mill Wastewater Derived Biohydrogen via Modeling and Artificial Neural Network
Published 2023“…Model validity describes the first sub-objective, which is to solve the complexity of the nonlinear interaction of multiple MEC input variables related to the hydrogen production rate response using artificial neural networks (ANN) before validating the mathematical modeling results by comparing experimental data with the predicted substrate concentration profile and hydrogen production rate profile based on the re-estimated input values of the model parameters using single-objective optimization based on the nonlinear convex method using gradient descent algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
16
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis
