Search Results - (( process verification means algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- process verification »
- verification means »
- java application »
- means algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
-
5
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
6
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…This thesis focuses on the substrate and part distortion induced by wire arc additive manufacturing (WAAM) which is predicted by means of numerical computation followed by experimental verification. …”
Get full text
Get full text
Thesis -
7
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
Get full text
Get full text
Thesis -
8
Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok
Published 2019“…In addition, the mean square error (MSE) values for ANN model algorithms (pattern recognition tool) for 5 prediction processes are low from 0.00 to 0.0286 and errors from 0.00 to 0.0309. …”
Get full text
Get full text
Thesis -
9
Discretized Markov Chain in Damage Assessment Using Rainflow Cycle with Effects of Mean Stress On An Automobile Crankshaft
Published 2016“…We studied the effect of mean stress correction factor using the Rainflow counting technique to assess the fatigue damage of an automobile crankshaft under service loading by considering the stochastic process of the Markov chain. …”
Get full text
Get full text
Get full text
Article -
10
Hand, Foot and Mouth Disease (HFMD)'s Hotspot Identification using Bipartite Network Model
Published 2020“…The location node ranked based on the vector density of the disease. Verification analysis with a root mean square error (RMSE) value of 0.000564 and 0.000812 for location and human nodes respectively, which is much lower than threshold value of 0.05. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
11
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Despite its performances, GWO is not without limitation.Precisely, the current best optimal individual of GWO is biased toward alpha and other individuals (e.g. beta and delta) attempt to modify their positions toward this best individual in each iteration process. This update process may cause the algorithm to fall to local optima especially in the cases where there are many competing local optima. …”
Get full text
Get full text
Thesis -
12
User authentication using neural network in smart home
Published 2009“…Hence, a faster training algorithm, Resilient Backpropagation (RPROP) is embedded to the network to accelerate the training process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Results were verified to present the inclusiveness, accuracy, and system algorithm. The verification activity involved exploring the knowledge base, coding of reasoning processes / inference engine, technical performance, ability for development, and interface. …”
Get full text
Get full text
Thesis -
14
-
15
Application of Neural Network in User Authentication for Smart Home System
Published 2009“…Hence, a faster training algorithm, Resilient Backpropagation (RPROP) is embedded to the MLPs Neural Network to accelerate the training process. …”
Get full text
Get full text
Get full text
Article -
16
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
Get full text
Get full text
Conference or Workshop Item -
17
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…The proposed framework has also been compared with existing stateof- the-art detection algorithms. Experimental results show that MDMRBF outperforms these algorithms with precision and recall being 94% and 89%, respectively. …”
Get full text
Get full text
Get full text
Thesis -
18
Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping
Published 2020“…The photographs were processed and georeferenced using an Agisoft PhotoScan algorithm and ten of established ground control points, respectively. …”
Get full text
Get full text
Thesis -
19
-
20
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…Using the cosine similarity algorithm for knowledge recommendation is village identified, utilizing community feedback as the foundation. …”
Get full text
Get full text
Get full text
Get full text
Thesis
