Search Results - (( programme data normalization algorithm ) OR ( java application bat algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Several statistical tests such as normality test and reliability analysis were conducted. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Classification of Cervix Type by Muktiar Singh, Jasdeep Singh

    Published 2019
    “…There are three different types of cervix, these different types of cervix in our data set are all considered normal (not cancerous, but some are pre-cancerous), but since the transformation zones are not always visible, some of the patients require further testing while some do not. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. The proposed design is implemented on Field Programmable Gate Arrays (FPGAs) platform, which can provide real-time SENSE reconstruction right on the receiver coil data acquisition system with no need to transfer data to the MRI server. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Preliminary study on fault detection using artificial neural network for water-cooled reactors by Abdul Karim, Julia, Lanyau, Tony, Maskin, Masleha, Anuar, M. A. S., Che Soh, Azura, Abdul Rahman, Ribhan Zafira

    Published 2020
    “…This work was carried out to discover the use of an artificial neural network (ANN) to model and develop a fault detection programme in the RTP cooling system. Using actual data from the reactor to train the multilayer network model with backpropagation algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Self routing traffic light for traffic light controller using priority method based on volume of vehicles by Tan, Swee Tiang

    Published 2015
    “…This research uses data at a cross traffic junction in Perak between Jalan Taiping and Kuala Sepatang with the primary data provided by Jabatan Kerja Raya, JKR Larut Matang & Selama, Taiping. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis