Search Results - (( parameter estimation customization algorithm ) OR ( java application during algorithm ))
Search alternatives:
- estimation customization »
- customization algorithm »
- application during »
- java application »
- during algorithm »
- parameter »
-
1
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…The hybrid algorithm is able to preselect customers to be inspected on-site for abnormalities or potential fraud according to their consumption patterns. …”
Conference Paper -
2
Processing time estimation in precision machining industry using AI / Lim Say Li
Published 2017“…An AI approach for processing time estimation by implementing desired input parameters and machining data is tested and completed. …”
Get full text
Get full text
Thesis -
3
Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain
Published 2014“…Next, an electrical load profiles is estimated using limited information to ensure proper power usage measurement of the customers. …”
Get full text
Get full text
Thesis -
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak
Published 2018“…A Dead Reckoning (DR) navigation technique is employed to steer the quadrotor on the path. The scheme and algorithm are experimented in low, moderate and high categories of deviation acceleration via a customized quadrotor. …”
Get full text
Get full text
Thesis -
6
Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich
Published 2019“…New multi-criterion handover decision parameters are proposed in typical/dense femtocells in macrocells environment to estimate the target cell for handover. …”
Get full text
Get full text
Thesis -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. By using the developed arm pose tracking program, several important parameters such as positions of the elbow and wrist with reference to the shoulder joint, moving distance, angular movement speed and movement pattern of arm are successfully measured and estimated. …”
Get full text
Get full text
Get full text
Thesis -
9
Fiducial registration error as a statistical process control metric in image-guidance radiotherapy with fiducial markers
Published 2011“…A procedure for estimating control parameters of a SPC control chart (x-chart) from a small number of initial observations (N) of FRE was implemented. …”
Get full text
Article -
10
Image orientation watermarking technique for copyright protection
Published 2016“…In addition, it formulates two measuring parameters, for evaluating protection techniques, namely Protection Requirement Parameter (PR) and Distance Decision Measure (D). …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
