Search Results - (( program implementation function algorithm ) OR ( basic elicitation process algorithm ))

Refine Results
  1. 1

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…The first technique is to encode the logic programming in radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Projecting image on non-planar surface with zero-th order geometric continuity using simple dual-linear function and manipulation of strict integer implementation in programming la... by Yusoff, Fakhrul Hazman, Azhar, Muhammad Amirul

    Published 2015
    “…Usage of a projection system to display large screen images is still relevant in the midst of LED-based display increasing popularity.This is due to that the system itself is a mature technology, reliable and cheaper than the LED counterpart.While various methods had addressed the projection problems on curve surface, projecting image on jagged like surface (zero order geometric continuity) has yet to be studied in depth.This paper proposes a method for projecting image on non-planar surface with zero-order geometric continuity property using parametric modeling.The method manipulate linear function by combining two functions into one by taking advantage of computer programs strict implementation of integer variables.The method was applied to grid-based texturing algorithm in order to create the desired zero-continuity effect on the surface.The method was compared with texturing that implement existing curve algorithm to project image on the screen.Visual evaluation results showed that the proposed method fared better compared to existing curve-based projection algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Shehab Abdulhabib Alzaeemi, Shehab Abdulhabib Alzaeemi, Kim Gaik Tay, Kim Gaik Tay, Audrey Huong, Audrey Huong, Saratha Sathasivam, Saratha Sathasivam, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Shehab Abdulhabib Alzaeemi, Shehab Abdulhabib Alzaeemi, Kim Gaik Tay, Kim Gaik Tay, Audrey Huong, Audrey Huong, Saratha Sathasivam, Saratha Sathasivam, Majid Khan bin Majahar Ali, Majid Khan bin Majahar Ali

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Shehab Abdulhabib Alzaeemi, Shehab Abdulhabib Alzaeemi, Kim Gaik Tay, Kim Gaik Tay, Audrey Huong, Audrey Huong, Saratha Sathasivam, Saratha Sathasivam, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Shehab Abdulhabib Alzaeemi, Shehab Abdulhabib Alzaeemi, Kim Gaik Tay, Kim Gaik Tay, Audrey Huong, Audrey Huong, Saratha Sathasivam, Saratha Sathasivam, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Kim Gaik Tay, Kim Gaik Tay, Audrey Huong, Audrey Huong, Saratha Sathasivam, Saratha Sathasivam, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed by Mohamed, Mohamad Zuhairy

    Published 2008
    “…MATLAB programming is sue to design the repetitive controller after that its implement to the SIMULINK software. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Implementation of color filtering on FPGA by P., Sebastian, M.N.B.M., Shukor, H.H., Lo

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in A • algorithm and its implementation in real-world application. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    IMAGE PROCESSING ALGORITHMS ON FPGA by MOHAMED SHUKOR, MOHAMED NASIR

    Published 2007
    “…The chosen image processing algorithms are implemented on two systems which are Color Filtering System and Edge Detection System. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed by Awang Ahmed, Rohana

    Published 2000
    “…The conventional filter design technique is adapted in writing a MATLAB program using the Signal Processing Toolbox. GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis