Search Results - (( java estimation using algorithm ) OR ( program implementing action algorithm ))

Refine Results
  1. 1

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A DC motor controller using PID algorithm implementation on PIC by Wan Robaah, W Ahmad

    Published 2008
    “…Then, a PIC microcontroller is programmed by adding the value of tuned PID algorithm to control the speed of DC servo motor. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6
  7. 7
  8. 8

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  9. 9

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A network based fetal ECG monitoring algorithm by Ibrahimy, Muhammad Ibn, Hasan , M. A., Motakabber, S. M. A.

    Published 2011
    “…The AECG signal is processed into the remote computer terminal and finally extracts the FECG signal by the FHR monitoring program. The networking program is developed by a client/server approach and it can transport the AECG data file as well as online chatting facility. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…There are four proposed algorithms based on the actions of viewing and writing EMR, as well as another two additional actions aimed at improving the security of the blockchain framework. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Estimation of dielectric constant for various standard materials using microstrip ring resonator by Low, Pek Jin, Esa, Fahmiruddin, You, Kok Yeow, Abbas, Zulkifly

    Published 2017
    “…The differences in frequency shift were used in NetBeans IDE 8.1 algorithm of Java for dielectric constant calculation. …”
    Get full text
    Get full text
    Article
  14. 14

    JTAGGER by YAACOB, NORHANA

    Published 2006
    “…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…To generate the visual simulation in the simulator, the Python programming language is employed. The improved algorithm will help encourage the real-world implementation of DRL in many autonomous driving applications.…”
    Get full text
    Get full text
    Monograph
  16. 16

    Hybridization solution of electrical energy demand response and forecasting program by using PSO-LSSVM technique by Ali, Amira Noor Farhanie, Sulaima, Mohamad Fani, Tahir, Musthafah Mohd., Razak, Intan Azmira Wan Abdul, Kadir, Aida Fazliana Abdul, Rahman, Zulkifli Ab.

    Published 2023
    “…To overcome this challenge, a demand-side management (DSM) approach is put into action, which involves the use of DR schemes and diverse action strategies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
    Get full text
    Get full text
    Article
  18. 18

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This is achieved by trying to combine several techniques of securing and strengthening the RSA algorithm. One of the techniques that will be looked into is 'knocking', where the authorized users will have to perform a series of predetermined actions to validate their requests for the information in addition of the public key they have. …”
    Get full text
    Get full text
    Final Year Project
  20. 20