Search Results - (( java implication based algorithm ) OR ( net implementation during algorithm ))

Refine Results
  1. 1
  2. 2

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Mobile machine vision for railway surveillance system using deep learning algorithm by Kit, Guan Lim, Daniel Siruno, Min, Keng Tan, Chung, Fan Liau, Sha, Huang, Tze, Kenneth Kin Teo

    Published 2021
    “…The detection model used in this paper is Single-Shot multibox Detection (SSD) MobileNet detection model. This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5
  6. 6
  7. 7

    Analysis of detection system for cover tape offset in the tap and reel process using neural net time series method by Khamil, Khairun Nisa, Rosli, Muhammad Irfan, Sulaiman, Siti Fatimah, Mohd Chachuli, Siti Amaniah, Isa, Ahmad Nizam

    Published 2025
    “…Additionally, the data is analyzed in MATLAB Neural Net Time Series for predictive analysis. The findings of this research, including the analysis of training results, demonstrate the successful implementation of a reliable cover tape misalignment detection system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Predicting Chlorophyll Intensity Of Various Plants Using Improved Convolutional Neural Network by Michelle, Nashrin Bawai

    Published 2023
    “…Hybrid CNN was designed by modifying the architectures of AlexNet and PNet using MATLAB R2023a. The performance of Hybrid CNN with SVR (CNN-SVR) was also compared with AlexNet, PNet, and SVR. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Implementation of case-based reasoning in help desk system by Tee, Shih Min

    Published 2019
    “…The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. To achieve this aim, CBR algorithm will be studied and implemented in the help desk system to assist the travel agent provide recommendation to customers on selecting the hotel to stay based on customers’ requirements. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…The proposed algorithm is a novel and first technique to address and report the successful implementation for the detection and classification of four diseases in potato leaves. …”
    Get full text
    Get full text
    Article
  12. 12

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…The proposed algorithm is a novel and first technique to address and report the successful implementation for the detection and classification of four diseases in potato leaves. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Relative position-based collision avoidance system for swarming UAVs using multi-sensor fusion by Rambabu, Rethnaraj, Bahiki, Muhammad Rijaluddin, Md Ali, Syaril Azrad

    Published 2015
    “…A collision avoidance algorithm that decides evasive manoeuvres in two dimensional flight by the means of net error calculation was developed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Chinese character recognition using neural network / Low Poh Tian by Low, Poh Tian

    Published 2003
    “…According to the implementation of this system, the input layer consists of 100 nodes and the output layer 5 nodes, each representing a character. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Techno-economic impact analysis for renewable energy-based hydrogen storage integrated grid electric vehicle charging stations in different potential locations of Malaysia by Roslan M.F., Ramachandaramurthy V.K., Mansor M., Mokhzani A.S., Jern K.P., Begum R.A., Hannan M.A.

    Published 2025
    “…In addition, the study emphasizes the necessity of advanced control algorithms to manage power quality issues during peak demand and suggests future field trials to validate the system's real-world performance. …”
    Article
  19. 19
  20. 20