Search Results - (( process verification means algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  6. 6

    Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana by Prajadhiana, Keval Priapratama

    Published 2024
    “…This thesis focuses on the substrate and part distortion induced by wire arc additive manufacturing (WAAM) which is predicted by means of numerical computation followed by experimental verification. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok by Bachok, Mohd Fatruz

    Published 2019
    “…In addition, the mean square error (MSE) values for ANN model algorithms (pattern recognition tool) for 5 prediction processes are low from 0.00 to 0.0286 and errors from 0.00 to 0.0309. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Discretized Markov Chain in Damage Assessment Using Rainflow Cycle with Effects of Mean Stress On An Automobile Crankshaft by Singh, Salvinder, Abdullah, Shahrum, Nik Abdullah, Nik Mohamed

    Published 2016
    “…We studied the effect of mean stress correction factor using the Rainflow counting technique to assess the fatigue damage of an automobile crankshaft under service loading by considering the stochastic process of the Markov chain. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model by Nor Shamira, Sabri

    Published 2020
    “…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Despite its performances, GWO is not without limitation.Precisely, the current best optimal individual of GWO is biased toward alpha and other individuals (e.g. beta and delta) attempt to modify their positions toward this best individual in each iteration process. This update process may cause the algorithm to fall to local optima especially in the cases where there are many competing local optima. …”
    Get full text
    Get full text
    Thesis
  12. 12

    User authentication using neural network in smart home by Jee,, Tze Ling

    Published 2009
    “…Hence, a faster training algorithm, Resilient Backpropagation (RPROP) is embedded to the network to accelerate the training process. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Application of Neural Network in User Authentication for Smart Home System by Joseph, A., David Bong, Boon Liang, Dayang Azra, Awang Mat

    Published 2009
    “…Hence, a faster training algorithm, Resilient Backpropagation (RPROP) is embedded to the MLPs Neural Network to accelerate the training process. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption by Siti Aishah, Rusdan, Tarlochan, Faris, Mohamad Rusydi, Mohamad Yasin

    Published 2013
    “…Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…The proposed framework has also been compared with existing stateof- the-art detection algorithms. Experimental results show that MDMRBF outperforms these algorithms with precision and recall being 94% and 89%, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping by Isola, Ajibola Ismaila

    Published 2020
    “…The photographs were processed and georeferenced using an Agisoft PhotoScan algorithm and ten of established ground control points, respectively. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi by Muhammad, Faisal

    Published 2024
    “…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis