Search Results - (( java implementation phase algorithm ) OR ( using programmes may algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- using programmes »
- phase algorithm »
- programmes may »
- may algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
VHDL modeling and simulation of the back-propagation algorithm and its mapping to the RM
Published 1993Get full text
Get full text
Get full text
Proceeding Paper -
4
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…For hardware implementation of the design, an Altera Field Programmable Gate Array (FPGA) device, EP20K200EFC484-2X from APEX family, APEX 20KE, has been used. …”
Get full text
Get full text
Thesis -
5
Fast fourier transform processor implementation for high inputs on field programmable gates array
Published 2018“…Verilog Hardware Description Language (Verilog HDL) and VHDL Languages are used to program the algorithms into the FPGA. FFT algorithms will be implemented for up to 4096 points to measure the high load processing capability. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Real-time tracking using edge and color feature
Published 2014Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Leaf condition analysis using convolutional neural network and vision transformer
Published 2024“…As a result, although customers may receive an excellent interactive features programme, the backend algorithm is not optimized. …”
Get full text
Get full text
Get full text
Article -
9
A step towards the development of VHDL model for ANN based EMG signal classifier
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
10
FPGA implementation of MCPFSK modulation for HF data communication
Published 2009Get full text
Working Paper -
11
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
12
Predicting usage for a marketable e-learning portal
Published 2014“…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
Get full text
Get full text
Conference or Workshop Item -
13
Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.]
Published 2019“…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
15
Web-based system for prioritization of research area in FSKM: a web system engineering approach / Mohd Azmeer Omar
Published 2012“…The system that has been developed is capable to allow lecturer to rate each research areas using star rating system. Then the most important research is calculated using scoring algorithm. …”
Get full text
Get full text
Thesis -
16
Preliminary study on fault detection using artificial neural network for water-cooled reactors
Published 2020“…Using actual data from the reactor to train the multilayer network model with backpropagation algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Design And Development Of Gas Argon Purging System
Published 2006“…Using a single pneumatic control valve with PI feedback controllers test, a method is proposed to design and develop to the current gas argon purging system while to identify that the present 6 different kinds of digital control valve may not give the actual flow rate to the liquid steel purging system. …”
Get full text
Get full text
Monograph -
18
Vector evaluated particle swarm optimization approach to solve assembly sequence planning problem
Published 2022“…Some heuristic methods may use Neural Network (NN), which need system training before start searching. …”
Get full text
Get full text
Article -
19
Remotely sensed imagery data application in mangrove forest: a review
Published 2018“…One effective method to circumvent this shortcoming is by using remotely sensed imagery data, which offers a more accurate way of measuring the ecosystem and a more efficient tool of managing the mangrove forest. …”
Get full text
Get full text
Get full text
Article -
20
The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh
Published 2020“…CNV analysis was performed using three independent algorithms: CNV partition v2.3.4, PennCNV and iPattern. …”
Get full text
Get full text
Thesis
