Search Results - (( knowledge implementation modified algorithm ) OR ( java applications optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Investigation On Optical Fibre Configurations For Process Tomography by Ibrahim, Sallehuddin

    Published 2002
    “…Linear back projection (LBP) algorithm is used to reconstruct the image. A modified reconstruction algorithm combining LBP and a priori knowledge is outlined. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance by S.Y.A.M. Fauzi, M. Othman, F.M.M. Shuib, K. Seman

    Published 2024
    “…Objective: In this paper, two modified designs proposed by the author are implemented into hardware and the resulting rate of power consumption is compared with that of the conventional design of the A5/1 stream cipher. …”
    Get full text
    Article
  16. 16

    Computation of Maass Cusp Forms on Singly Punctured Two-Torus and Triply Punctured Two-Sphere Using Mathematica by Mohamed Siddig, Abubaker Ahmed

    Published 2009
    “…All the computations were implemented in Mathematica and built in a way accessible to any one with an introductory knowledge in Mathematica. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Path Following Using A Learning Neural Network by NHH , Mohamad Hanif

    Published 2004
    “…To conduct the specified works, the MATLAB programs written by [2] have been extended and modified.…”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Road Crack Detection Using Adaptive Multi Resolution Thresholding Techniques by Othman, Zuraini, Abdullah, Azizi, Kasmin, Fauziah, Syed Ahmad, Sharifah Sakinah

    Published 2019
    “…Since threshold is one of the powerful methods used in the edge detection of an image, we have therefore proposed a modified Otsu-Canny Edge Detection Algorithm in the selection of the two threshold values as well as implemented a multi-resolution level fixed partitioning method in the analysis of the global and local threshold values of the image. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…In order to add to this area of knowledge, recording and analyzing these signals may give an optimum and safe control performance for ERD. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
    Get full text
    Get full text
    Get full text
    Thesis