Search Results - (( java implementation based algorithm ) OR ( based identification system algorithm ))

Refine Results
  1. 1

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…The proposed agent based system is called KSFaci (Knowledge Sharing Facilitator). …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  6. 6

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Identification of continuous-time hammerstein system using sine cosine algorithm by E. F., Junis, J. J., Jui, Mohd Helmi, Suid, Mohd Ashraf, Ahmad

    Published 2019
    “…This paper presents the development of identification of continuous-time Hammerstein systems based on Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm by Kamil Zakwan, Mohd Azmi, Pebrianti, Dwi, Zuwairie, Ibrahim, Shahdan, Sudin, Sophan Wahyudi, Nawawi

    Published 2015
    “…System identification is a technique used to obtain a mathematical model of a system by performing analysis of input-output characteristic of the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…Moreover, three experiments of the Hammerstein model identification based on a numerical example, an actual twin-rotor system, and an actual flexible manipulator system were carried out in this study to verify the effectiveness of the proposed NL-SFA-based method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…Forensic laboratories analyze firearm-related evidence utilizing established ballistic identification systems such as the Integrated Ballistic Identification System (IBIS), Advanced Ballistics Analysis System (ALIAS), EVOFINDER Automated Ballistic Identification System, and CONDOR Ballistic Identification System. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…In this paper, the blood vessel detection system is implemented and optimized in a portable device running Android OS on an ARM-based processor. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm by Jui, Julakha Jahan, Mohd Ashraf, Ahmad, Mohamed Sultan, Mohamed Ali, Mohd Anwar, Zawawi, Mohd Falfazli, Mat Jusof

    Published 2021
    “…This paper presents the identification of the Thermoelectric Cooler (TEC) plant using a novel metaheuristic called hybrid Multi-Verse Optimizer with Sine Cosine Algorithm (hMVOSCA) based continuous-time Hammerstein model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item