Search Results - (( java implication drops algorithm ) OR ( post implementation research algorithm ))

Refine Results
  1. 1

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System by Chiu Shoon, Sia

    Published 2024
    “…Therefore, in this research, we proposed an OFDMA and SC-FDMA implementation in this research study to overcome those problems on the uplink and downlink stage, to ensure Channel Assignment is fully implemented to achieve this research objective and answer the research question as well. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Improvement of Cepstrum Analysis for the Purpose to Detect Leak, Feature and Its Location in Water Distribution System based on Pressure Transient Analysis by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…To extract this signal, many signal analysis methods were implemented by researchers such as cross-correlation, genetic algorithm, and wavelets transform. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…This study adopted the Design Science Research methodology as the framework of the research process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment by Al-Doski, Jwan M. Mohammed

    Published 2013
    “…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improvement of Cepstrum Analysis for the Purpose to Detect Leak, Feature and Its Location in Water Distribution System based on Pressure Transient Analysis / Hanafi.M.Yusop ...[et... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2019
    “…To extract this signal, many signal analysis methods were implemented by researchers such as cross-correlation, genetic algorithm, and wavelets transform. …”
    Get full text
    Get full text
    Article
  9. 9

    Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm by Muhammad Arif, Abdullah

    Published 2019
    “…Therefore, the aim of this research is to establish a methodology and implement the relatively new algorithm to optimise the Energy Efficient Assembly Sequence Planning (EE-ASP) problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    JOINT TORQUEESTIMATION OF sEMG SIGNALS BASED ON INTELLIGENT TECHNIQUES FOR ROBOTIC ASSISTIVE SYSTEM by KU ABD RAHIM, KU NURHANIM

    Published 2014
    “…This research focuses on implementation of intelligent algorithms to convert the sEMG signals tojoint torque for task movement ofelbow flexion and knee extension for robotic assistive system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology by Lee, Feng Wei

    Published 2022
    “…Post-quantum cryptography has been one of the focuses of researchers since the initiation of quantum algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms by AbuSalim, S.W.G., Mostafa, S.A., Mustapha, A., Ibrahim, R., Wahab, M.H.A.

    Published 2023
    “…In this paper, we use an existing data set from previous research, which has 100 records of data, and manipulate the data by applying three machine learning algorithms for implementing classification and regression tasks. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    The largest studentized residual test for bad data identification in state estimation of a power system by Khan, Z., Razali, R.B., Daud, H., Nor, N.M., Firuzabad, M.F.

    Published 2015
    “…The chi-square and normalized residual tests are the common post estimation procedures usually used for detection and identification of gross errors in the estimation algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani by Che Ani, Adi Izhar

    Published 2023
    “…The current technique uses statistical models, but the dynamic properties of human physiology limit the current approach. This research aimed to propose modeling FES – PKO-assisted gait exercise in post-stroke rehabilitation through sub-modeling parts, which are the human gait model and the FES and PKO model. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study by Hassan, Md. Hasibul, Kamaruddin, Azrina, Azmi Murad, Masrah Azrifah

    Published 2021
    “…However, very little research was conducted about sentiment analysis approaches implementation in Bangla language. …”
    Get full text
    Get full text
    Article
  18. 18

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. In this research, a prototype named as Ganawa Security as a Service (GSecaaS) for CDS security is implemented. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Computer-generated fractals with medical application in trabecular bone structure / Hizmawati Madzin by Hizmawati , Madzin

    Published 2006
    “…There are two main aims of this research, one of which is to develop a prototype known as Fractal Generation System (FGS) whereby each type of fractal is generated by practical implementations of the theories with some adaptation in the following algorithms: IFS Iteration, Formula Iteration and Generator Iteration. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Novel Approach to Estimate Diffuse Attenuation Coefficients for QuickBird Satellite Images: A Case Study at Kish Island, the Persian Gulf. by Pradhan, Biswajeet, Mohd Shafri, Helmi Zulhaidi, Mansor, Shattri, Kabiri, Keivan, Samim-Namin, Kaveh

    Published 2013
    “…Eventually, the maximum likelihood classifier was implemented during pre and post correction steps to examine the capability of the proposed approach. …”
    Get full text
    Get full text
    Article