Search Results - (( java implication based algorithm ) OR ( net implementation during algorithm ))
Search alternatives:
- implementation during »
- net implementation »
- implication based »
- java implication »
- during algorithm »
-
1
A simulation software for DNA computing algorithms implementation
Published 2010Get full text
Get full text
Get full text
Article -
2
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…The detection model used in this paper is Single-Shot multibox Detection (SSD) MobileNet detection model. This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
-
6
-
7
Analysis of detection system for cover tape offset in the tap and reel process using neural net time series method
Published 2025“…Additionally, the data is analyzed in MATLAB Neural Net Time Series for predictive analysis. The findings of this research, including the analysis of training results, demonstrate the successful implementation of a reliable cover tape misalignment detection system. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Predicting Chlorophyll Intensity Of Various Plants Using Improved Convolutional Neural Network
Published 2023“…Hybrid CNN was designed by modifying the architectures of AlexNet and PNet using MATLAB R2023a. The performance of Hybrid CNN with SVR (CNN-SVR) was also compared with AlexNet, PNet, and SVR. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Implementation of case-based reasoning in help desk system
Published 2019“…The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. To achieve this aim, CBR algorithm will be studied and implemented in the help desk system to assist the travel agent provide recommendation to customers on selecting the hotel to stay based on customers’ requirements. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
A novel framework for potato leaf disease detection using an efficient deep learning model
Published 2022“…The proposed algorithm is a novel and first technique to address and report the successful implementation for the detection and classification of four diseases in potato leaves. …”
Get full text
Get full text
Article -
12
A novel framework for potato leaf disease detection using an efficient deep learning model
Published 2022“…The proposed algorithm is a novel and first technique to address and report the successful implementation for the detection and classification of four diseases in potato leaves. …”
Get full text
Get full text
Article -
13
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
Relative position-based collision avoidance system for swarming UAVs using multi-sensor fusion
Published 2015“…A collision avoidance algorithm that decides evasive manoeuvres in two dimensional flight by the means of net error calculation was developed. …”
Get full text
Get full text
Get full text
Article -
16
An e-voting application using cryptography technology
Published 2020“…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Chinese character recognition using neural network / Low Poh Tian
Published 2003“…According to the implementation of this system, the input layer consists of 100 nodes and the output layer 5 nodes, each representing a character. …”
Get full text
Get full text
Thesis -
18
Techno-economic impact analysis for renewable energy-based hydrogen storage integrated grid electric vehicle charging stations in different potential locations of Malaysia
Published 2025“…In addition, the study emphasizes the necessity of advanced control algorithms to manage power quality issues during peak demand and suggests future field trials to validate the system's real-world performance. …”
Article -
19
Handover Parameter for Self-optimisation in 6g Mobile Networks: A Survey
Published 2024journal::journal article -
20
