Search Results - (( java validation study algorithm ) OR ( parameter realization path algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    All-pass filtered x least mean square algorithm for narrowband active noise control by Mondal (Das), Kuheli, Das, Saurav, Abu, Aminudin, Hamada, Nozomu, Toh, Hoong Thiam, Das, Saikat, Faris, Waleed Fekry

    Published 2018
    “…The results also show that the proposed method outperforms other LMS algorithm without secondary path modelling. The proposed narrowband LMS algorithm would benefit in the design of efficient feedforward ANC system that can realize noise control in air intake duct applications.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…For the purpose of this study, multiple ANFIS or MANFIS have been selected to predict optimum parameter for polishing parameters. Polishing parameter data can be generated by using MANFIS to predict optimum polishing parameters such as grit size, polishing time and polishing force in order to perform polishing process. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…For statistical analysis, a Wilcoxon non-parametric test is used to test and validate the results of the experiments. This study illustrated some contributions, 1. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…Consequently, during peak hours, finding a vacant parking bay is more of a difficult task. This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Compressed channel estimation for massive MIMO-OFDM systems over doubly selective channels by Uwaechia, Anthony Ngozichukwuka, Mahyuddin, Nor Muzlifah, Ain, Mohd Fadzil, Abdul Latiff, Nurul Muazzah, Za'bah, Nor Farahidah

    Published 2019
    “…., modified CE-SBEM) can improve the resolution of the angles of departures (AoDs) information to represent the downlink with far fewer parameter dimensions, since the AoDs are much slower than path gains. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…However, conventional CNC machines could not find its place in the new era of machining under the conventional standard of ISO 6983 due to its limitation in compatibility, language difference and control has caused increase in terms of repurchase cost, reinstallations, reconfigurations and also training of operators. Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…This research follows an empirical research methodology, where the proposed approach is validated using 40 object-oriented open-source software systems written in Java. …”
    Get full text
    Get full text
    Thesis