Search Results - (( knowledge implementation modified algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- knowledge implementation »
- application optimisation »
- implementation modified »
- optimisation algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
-
3
The effect of total bits and number of LFSRs on the hardware performance of modified A5/1 stream ciphers
Published 2024journal::journal article -
4
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
Get full text
Get full text
Get full text
Article -
5
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
6
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis -
7
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
8
-
9
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
10
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
13
Investigation On Optical Fibre Configurations For Process Tomography
Published 2002“…Linear back projection (LBP) algorithm is used to reconstruct the image. A modified reconstruction algorithm combining LBP and a priori knowledge is outlined. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance
Published 2024“…Objective: In this paper, two modified designs proposed by the author are implemented into hardware and the resulting rate of power consumption is compared with that of the conventional design of the A5/1 stream cipher. …”
Get full text
Article -
16
Computation of Maass Cusp Forms on Singly Punctured Two-Torus and Triply Punctured Two-Sphere Using Mathematica
Published 2009“…All the computations were implemented in Mathematica and built in a way accessible to any one with an introductory knowledge in Mathematica. …”
Get full text
Get full text
Thesis -
17
Path Following Using A Learning Neural Network
Published 2004“…To conduct the specified works, the MATLAB programs written by [2] have been extended and modified.…”
Get full text
Get full text
Final Year Project -
18
Road Crack Detection Using Adaptive Multi Resolution Thresholding Techniques
Published 2019“…Since threshold is one of the powerful methods used in the edge detection of an image, we have therefore proposed a modified Otsu-Canny Edge Detection Algorithm in the selection of the two threshold values as well as implemented a multi-resolution level fixed partitioning method in the analysis of the global and local threshold values of the image. …”
Get full text
Get full text
Get full text
Article -
19
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…In order to add to this area of knowledge, recording and analyzing these signals may give an optimum and safe control performance for ERD. …”
Get full text
Get full text
Thesis -
20
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
Get full text
Get full text
Get full text
Thesis
