Search Results - (( pre implementation search algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…Overall, the developed algorithms have similar PSNR value and lower average search point compared to superior algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…The more often it is stated within a given text and the more crucial it is. Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    An intelligent adjustable spanner for automated engagement with multi-diameter bolts/nuts during tightening/loosening process using vision system and fuzzy logic by Ali, Mohammed A. H., Alshamer, Mohammed A.

    Published 2018
    “…It can be generally divided into three different stages, namely image pre-processing, image processing, and image post-processing. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Makarin, Rusydi Hasan, Jaafar, Abi Dzar

    Published 2010
    “…In an envisaged pre-commercialization phase, the UCE block cipher would be implemented in FPGA chips. …”
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…This can overcome the existing memory-based algorithms such as random search (RS) and simulated annealing (SA) which currently produce less control accuracy due to the local minimum problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…This can overcome the existing memory-based algorithms such as random search (RS) and simulated annealing (SA) which currently produce less control accuracy due to the local minimum problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive Embedded Clonal Evolutionary Programming (AECEP) for optimal Distributed Generation (DG) location and sizing in a distribution system by Nur Zahirah, Mohd Ali

    Published 2013
    “…First step study started by using a conventional technique as a pre-study of DG location and sizing. The Heuristic Search Technique (HST) was developed to empirically determine the location and sizing of DG for the same purpose. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam by Rustam, Ilham

    Published 2015
    “…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan by Ahmat Ruslan, Fazlina

    Published 2015
    “…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
    Get full text
    Get full text
    Thesis
  14. 14

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…To select the optimal hyperparameters for the Transformer model, the Tree Parzen Estimator(TPE) optimization in combination with the Hyperband pruning algorithm is employed to search for the best combination that yields the lowest Root Mean Squared Error(RMSE)and Mean Absolute Error (MAE) error metrics. …”
    text::Thesis
  15. 15

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis