Search Results - (( pattern operating new algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    New reflector shaping methods for dual-reflector antenna by Quzwain, Kamelia, Yamada, Yoshihide, Kamardin, Kamilia, Abd Rahman, Nurul Huda, Ismail, Alyani

    Published 2022
    “…In the fifth-generation (5G) mobile system, new millimeter-wave technologies such as small cell size and multibeam operation are introduced at the base station. …”
    Get full text
    Get full text
    Article
  4. 4

    Reservoir water release dynamic decision model based on spatial temporal pattern by Suriyati, Abdul Mokhtar

    Published 2016
    “…The model can be used by the reservoir operator to assist their decision making and support the new reservoir operator in the absence of an experience reservoir operator.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Toward heterogeneous computing to facilitate sequential OLAP real-time applications by Hameed, Shihab A., Habaebi, Mohamed Hadi, Alzeini, Haytham I. M.

    Published 2016
    “…The optimized algorithm is dedicated to detect patterns over parallel data streams in Real-Time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7
  8. 8

    Performance optimization on axial-flux permanent magnet coreless generator using novel hybrid computational method based on genetic algorithm and pattern search / Lok Choon Long by Lok , Choon Long

    Published 2016
    “…This hybrid model utilizes concepts from GA and invents new generation chromosomes not only through mutation and crossover operation but also by mechanism of PS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Case study : an effect of noise in character recognition system using neural network by Mohamad, Esmawaty

    Published 2003
    “…These problems may be characterized as mapping(including pattern association and pattern classification), clustering and constrained optimization. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test by CH’NG , MING ZONG

    Published 2017
    “…Through the analysis of the fault patterns and other algorithm, it was found that multiple read operation within a single MARCH element from MARCH-NU algorithm can aid in the identification of the Read Destructive Fault whereas having HOLD time in the MARCH 9N algorithm would expose the Data Retention Fault. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…It is relevant because it generalizes this process of music creation and provides instruments to musicians and non-musicians for diving into new, unique forms of musical expression. Genetic Algorithms will be chosen because they constantly improve solution, hence appropriate for the development of compositions consistent with the creative and harmonic principles. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14

    Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor by Kataraki, Pramod S, Abu Mansor, Mohd Salman

    Published 2018
    “…Second, the inner loop of each face having depression feature is covered by generating a new face. Third, a lofting operation is performed between new faces to generate feature volume for the depression feature and fourth, the algorithm utilizes vertex attributes of feature volume to recognize feature type. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…Most prior block based methods rely on exhaustive block matching on image contents and suffer from their inability to localize this type of forgery when the duplicated regions have gone through some geometric transformation operations and post-processing operations. In this research, we propose three novel approaches for detecting duplicate regions in forged images that are robust to common geometric transformations and post processing operations. …”
    Get full text
    Get full text
    Thesis
  17. 17

    HILBERT-LSB-C as Authentication System for Color Medical Images by Syifak Izhar, Hisham, Jasni, Mohamad Zain, Nurul Wahidah, Arshad, Siau-Chuin, Liew

    Published 2015
    “…This paper proposes a new numbering method for a fragile watermarking algorithm aimed at improving color medical image watermarking. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Adaptive beamforming of steerable array monopole antenna for WLAN application by Amer Asem, Abdullah

    Published 2018
    “…The proposed approach can be considered a fast and significant candidate for new generation of smart communication WLAN applications.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis