Search Results - (( parallel optimization sensor algorithm ) OR ( process certification system algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2018
    “…Stereo vision sensor consists of two stereo cameras, mounted parallel in stationary position. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Single-objective and multi-objective optimization algorithms based on sperm fertilization procedure / Hisham Ahmad Theeb Shehadeh by Hisham Ahmad, Theeb Shehadeh

    Published 2018
    “…The obtained results are compared with the results of four algorithms. These algorithms are Genetic Algorithms (GA), Parallel Genetic Algorithm (PGA), Particle Swarm Optimization (PSO) and Accelerated Particle Swarm Optimization (APSO). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique by Mohd Mawardi, Saari, Mohd Herwan, Sulaiman, Kiwa, Toshihiko

    Published 2023
    “…In this work, the core size estimation technique of magnetic nanoparticles (MNPs) using the static magnetization curve obtained from a high-Tc SQUID magnetometer and a metaheuristic inversion technique based on the Particle Swarm Optimizer (PSO) algorithm is presented. The high-Tc SQUID magnetometer is constructed from a high-Tc SQUID sensor coupled by a flux transformer to sense the modulated magnetization signal from a sample. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…These algorithms are then parallelized using Compute Unified Device Architecture CUDA C language to run on Graphics Processing Unit GPU for hardware acceleration. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad... by Ahmad, Nurul Atirah, Abu Samah, Khyrina Airin Fariza, Ahmad Kushairi, Nuwairah Aimi

    Published 2023
    “…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
    Get full text
    Get full text
    Book Section
  9. 9
  10. 10

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
    Get full text
    Get full text
    Thesis