Search Results - (( java implementation phase algorithm ) OR ( using activity within algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- within algorithm »
- phase algorithm »
- using activity »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
Active intelligent control of vibration of flexible plate structures
Published 2011“…The approach is realised within SISO and SIMO AVC structures using RCGA, PSO and AIS algorithms. …”
Get full text
Get full text
Thesis -
4
Intelligent active force control of a robotic arm using genetic algorithm
Published 2002“…In this paper, genetic algorithm (GA) is used to estimate suitable value of IN of a robotic manipulator necessary for the implementation of the AFC strategy through a simulation study. …”
Get full text
Get full text
Get full text
Article -
5
Enhanced control algorithms for multilevel inverter-based shunt active power filter
Published 2017“…Second, overall DC-link voltage of SAPF is still regulated using inaccurate yet slow response control algorithms. …”
Get full text
Get full text
Get full text
Thesis -
6
DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES
Published 2019“…In this study, we propose to implement a deep-learning approach for detection of ships on satellite images in various conditions. The deep-learning algorithm to be deployed is Faster R-CNN and to be implemented using MATLAB. …”
Get full text
Get full text
Final Year Project -
7
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
Get full text
Get full text
Article -
8
Delineating mangrove forest zone using spectral reflectance
Published 2020“…Species identification with spectral library derived from in-situ measurements using SID algorithm and derived from Landsat 8 using SAM algorithm was done. …”
Get full text
Get full text
Thesis -
9
-
10
Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control
Published 2018“…With such an algorithm, the robot is able to localize itself within the road environment and find a collision free-path starting from a pre-defined start position to a goal point using a novel approach called laser simulator (LS). …”
Get full text
Get full text
Get full text
Article -
11
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
Get full text
Get full text
Get full text
Article -
12
CSGO: a game-inspired metaheuristic algorithm for global optimization
Published 2023“…The main inspiration of this proposed chaotic SFS-GTO optimizer (CSGO) algorithm is the survival-of-the-fittest agent within a virtual map environment between two competitive groups in order to accomplish a mission using diverse strategies and information gathering-sharing activities. …”
Get full text
Get full text
Conference or Workshop Item -
13
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. Performance of the AVC algorithm is assessed based on parametric design techniques, using RLS and GAS, and non-parametric design techniques, using MLP-NN and ANFIS in the suppression of vibration of the flexible structures. …”
Get full text
Get full text
Get full text
Thesis -
14
Intelligent DNA signature detection for internet worms
Published 2011“…Internet scanning worms are widely regarded to be a major security threat faced by the Internet community today. Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
15
Performance of Multi-Layer Perceptron Neural Networks with an Exponential Decay Activation Function in Airwaves Estimation
Published 2013“…The benchmark for the performance evaluation is by comparing the exponential decay activation function with log-sigmoid and tan-sigmoid activation functions through back propagation algorithm. …”
Get full text
Get full text
Citation Index Journal -
16
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…This paper presents a novel inertia moment estimation algorithm to enable the Active Force Control Scheme for tracking a wheeled mobile robot (WMR) effectively in a specific trajectory within constrained environments such as on roads or in factories. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…This paper presents a novel inertia moment estimation algorithm to enable the Active Force Control Scheme for tracking a wheeled mobile robot (WMR) effectively in a specific trajectory within constrained environments such as on roads or in factories. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
CSI-based human activity recognition via lightweight compact convolutional transformers
Published 2024“…The existing methods sacrifice accuracy for computational efficiency or vice versa, compromising the reliability of activity recognition within pervasive environments. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…This paper presents a novel inertia moment estimation algorithm to enable the Active Force Control Scheme for tracking a wheeled mobile robot (WMR) effectively in a specific trajectory within constrained environments such as on roads or in factories. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Mapping of Krau Wildlife Reserve (KWR) protected area using Landsat 8 and supervised classification algorithms
Published 2018“…Mapping protected areas (PAs) is essential in understanding the disturbance that can affect biodiversity and conservation management. Land use-land cover (LULC) maps can be used as a decision making tool by policy makers to ensure sustainable development and understanding of the effect of human activities within and around PAs. …”
Get full text
Get full text
Get full text
Article
