Search Results - (( java implementation phase algorithm ) OR ( post implementation research algorithm ))
Search alternatives:
- implementation research »
- implementation phase »
- java implementation »
- post implementation »
- research algorithm »
- phase algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
Get full text
Get full text
Thesis -
4
-
5
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
6
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…Therefore, in this research, we proposed an OFDMA and SC-FDMA implementation in this research study to overcome those problems on the uplink and downlink stage, to ensure Channel Assignment is fully implemented to achieve this research objective and answer the research question as well. …”
Get full text
Get full text
Get full text
Thesis -
7
Improvement of Cepstrum Analysis for the Purpose to Detect Leak, Feature and Its Location in Water Distribution System based on Pressure Transient Analysis
Published 2017“…To extract this signal, many signal analysis methods were implemented by researchers such as cross-correlation, genetic algorithm, and wavelets transform. …”
Get full text
Get full text
Get full text
Article -
8
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…This study adopted the Design Science Research methodology as the framework of the research process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis -
10
Improvement of Cepstrum Analysis for the Purpose to Detect Leak, Feature and Its Location in Water Distribution System based on Pressure Transient Analysis / Hanafi.M.Yusop ...[et...
Published 2019“…To extract this signal, many signal analysis methods were implemented by researchers such as cross-correlation, genetic algorithm, and wavelets transform. …”
Get full text
Get full text
Article -
11
Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm
Published 2019“…Therefore, the aim of this research is to establish a methodology and implement the relatively new algorithm to optimise the Energy Efficient Assembly Sequence Planning (EE-ASP) problem. …”
Get full text
Get full text
Thesis -
12
JOINT TORQUEESTIMATION OF sEMG SIGNALS BASED ON INTELLIGENT TECHNIQUES FOR ROBOTIC ASSISTIVE SYSTEM
Published 2014“…This research focuses on implementation of intelligent algorithms to convert the sEMG signals tojoint torque for task movement ofelbow flexion and knee extension for robotic assistive system. …”
Get full text
Get full text
Thesis -
13
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…Post-quantum cryptography has been one of the focuses of researchers since the initiation of quantum algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms
Published 2023“…In this paper, we use an existing data set from previous research, which has 100 records of data, and manipulate the data by applying three machine learning algorithms for implementing classification and regression tasks. …”
Get full text
Get full text
Article -
15
-
16
-
17
The largest studentized residual test for bad data identification in state estimation of a power system
Published 2015“…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
Get full text
Get full text
Article -
18
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…The current technique uses statistical models, but the dynamic properties of human physiology limit the current approach. This research aimed to propose modeling FES – PKO-assisted gait exercise in post-stroke rehabilitation through sub-modeling parts, which are the human gait model and the FES and PKO model. …”
Get full text
Get full text
Thesis -
19
Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study
Published 2021“…However, very little research was conducted about sentiment analysis approaches implementation in Bangla language. …”
Get full text
Get full text
Article -
20
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. In this research, a prototype named as Ganawa Security as a Service (GSecaaS) for CDS security is implemented. …”
Get full text
Get full text
Thesis
