Search Results - (( software program gaining algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…The algorithm have been implemented in MATLAB software and a program was developed to investigate the power spectrum of a fixed samples, 100 with the number of elements 15 with the existence of noise. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A DC motor controller using PID algorithm implementation on PIC by Wan Robaah, W Ahmad

    Published 2008
    “…A simulation using MATLAB software is implemented to tune PID algorithm by changing the value of Proportional gain, Kp, Integral gain, Ki and Derivative gain, Kd to get a speed of the motor which is less overshoot and increase settling time. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4
  5. 5

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Long-term rain attenuation probability and site diversity gain prediction formulas by Al-Tabatabaie, Kusay Faisal A.

    Published 2007
    “…The aim of this project is to determine the effect of SD under the rain conditions, combine both categories for the estimation of slant path rain attenuation and SD gain. It includes the designing of algorithm flow which incorporated into MATLAB programming software. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Improving the security model of software define networks by Ismail Ibrahim Mohamed Almahdy

    Published 2023
    “…With the emerging use of Software Defined Network that uses an agile and centralized system for a network, the risk and security issues emerges as well. …”
    text::Final Year Project
  8. 8
  9. 9

    Design and implementation of an optimal fuzzy logic controller using genetic algorithm by Khan, Sheroz, Abdulazeez, Salami Femi, Adetunji, Lawal Wahab, Alam, A. H. M. Zahirul, Salami, Momoh Jimoh Emiyoka, Hameed, Shihab A., Hassan Abdalla Hashim, Aisha, Islam, Mohd Rafiqul

    Published 2008
    “…Present study was based on a software approach which was focusing on an algorithmic approach for programming a PIC16F877A microcontroller, for eliminating altogether the parametric dependence issues while adding the benefits of easier modification to suit a given control system to changing operational conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Web page design for electronic commerce / Lee Fong Wai by Lee , Fong Wai

    Published 2003
    “…The sixth part covers the system implementation that involved the transformation of modules and algorithm into implementable commands by using the specified programming languages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Building extraction of worldview3 imagery via support vector machine using scikit-learn module / Najihah Ismail by Ismail, Najihah

    Published 2021
    “…Python is an open source of programming software that conducted programming-based technique using the Scikit-Learn module to do the extraction of building from Land used land cover (LULC) and the result was 86.233% for overall accuracy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simulation on Emotion Recognition for Autism Therapy by Adzmi, Muhammad Azrin

    Published 2017
    “…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An analysis on the applicability of meta-heuristic searching techniques for automated test data generation in automatic programming assessment by Musa, Ja’afar, Romli, Rohaida, Yusoff, Nooraini

    Published 2019
    “…Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    VOICE MODIFICATION USING DIGITAL TECHNOLOGY by Nik Mohd Naaim, Nik Najiha Wahida

    Published 2004
    “…Tests were carried on both software and hardware. The software conversion design can convert any source voice signal to target voice signal. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications by Lim, Ee Wah

    Published 2015
    “…This shows that wBD algorithm can be optimally implemented in hardware and demonstrates excellent speed gain over pure software implementation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S.M.M Yassin, S.M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Sizing of battery energy storage system: A multi-objective optimization approach in DIgSILENT powerfactory by Gan, Chin Kim, Keek, Joe Siang, Al-Areqi, Khaldon Ahmed Qaid, Tee, Wei Hown, Sardi, Junainah

    Published 2023
    “…In this regard, a multi-objective optimization script in DIgSILENT Programming Language (DPL) which links with software modelling and scripting simulation is developed in this study. …”
    Get full text
    Get full text
    Get full text
    Article