Search Results - (( java implementation cell algorithm ) OR ( program extraction utilizing algorithm ))

Refine Results
  1. 1
  2. 2

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. The result of this project are expected to be a comparison of the used methods that will give an indication how well evolutionary programming can perform relative to conventional method and how good the results of the data mining process.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The methodology starts with literature comprehension studies on the computation pitfalls and existed augmentation studies of Simplex algorithm. Then, followed by concept development which consists of concept extraction, computation stages classification and algorithms integration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
    Get full text
    Get full text
    Student Project
  7. 7

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Process of model based slicing is utilized to extract the desired lump out of slice diagram. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application by Mat Seman., Norhidayah

    Published 2019
    “…In most cases, the position controllers rarely utilize geometrical drawing such as CAD/CAM trajectory as input reference without extensive programming or trajectory generation algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…Several distinctive feature from each character is extracted using a few feature extraction methods, in which a comparison between three types of feature extraction modules were used. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…In recent years, there is an increase in the number of open source software.Hence, the demand for automatic software classification is also increasing.Latent Semantic Indexing (LSI) is an information retrieval approach that is utilized in classifying source code programs. This research proposes a Latent Semantic Indexing classifier that integrates information structural and frequency of terms in its weighting scheme.The content terms are identified by extracting words in the source code program. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Finite Element Modeling Of Ballistic Penetration into Fabric Armor by Talebi, Hossein

    Published 2006
    “…This program (named DYNTEX) based on the mentioned algorithm is designed using MATLAB code. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  15. 15

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
    Get full text
    Get full text
    Article
  16. 16

    Peripheral Interface Controller (PIC) Based Maximum Power Point Tracking (MPPT) Algorithm For Photovoltaic (PV) DC To DC Boost Converter by Siam, Effendy Onn

    Published 2016
    “…The design of a MPPT is proposed utilizing a boost-converter topology. Solar panel voltage and current are continuously monitored by a closed-loop microprocessor based control system, and the duty cycle of the boost converter continuously adjusted to extract maximum power. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A multi-agent model for information processing in computational problem solving by Mohd Aris, Teh Noranis, Nazeer, Shahrin Azuan

    Published 2013
    “…In order to assist novice students in computational problem solving, a multi-agent model is designed.The proposed model is different from existing model in terms of the unique architecture that utilizes agents for information processing, specifically to extract, transform and generate information. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    REAL TIME ABNORMAL SOUND DETECTION AND CLASSIFICATION FOR HOME ENVIRONMENT by MOHAMED AMIN, SITI NUR AZIMAH

    Published 2011
    “…There are various algorithms available to identify and classify the abnormal event sound. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems by Chang, Hsueh-Hsien, Yang, Chuan Choong, Lee, Wei-Jen

    Published 2021
    “…In this work, the fault signals measured at the utilities are extracted by the hyperbolic S-transform (HST) before going through the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20