Search Results - (( using application based algorithm ) OR ( basic validation using algorithm ))

Refine Results
  1. 1

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation by Toha, Siti Fauziah, Abd Latiff, I., Mohamad, M., Tokhi, M Osman

    Published 2009
    “…Thus, the usage of dynamic SF is proved experimentally to satisfy main issues of using basic PSO that are trapped in local optima and preservation of diversity. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    Simultaneous Computation of Model Order and Parameter Estimation of a Heating System Based on Gravitational Search Algorithm for Autoregressive with Exogenous Inputs by Kamil Zakwan, Mohd Azmi, Zuwairie, Ibrahim, Pebrianti, Dwi, Sophan Wahyudi, Nawawi, Nor Azlina, Ab. Aziz

    Published 2015
    “…In this paper, an approach termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is basically based on Gravitational Search Algorithm (GSA), is proposed to combine these two parts into a simultaneous solution. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Modeling and design control strategy for unwind/rewind system by Ismail, Muhamad Fahezal

    Published 2008
    “…A new control algorithm that based on the regulator feedback was proposed. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The rank of the pages is computed based on fuzzy weighted average value. A prototype is built using visual basic 2008 to validate the proposed blogs search engine. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Various cost estimation models and methods are available to be used for software development process. The COCOMO, an algorithmic model is one example. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…A continuous time model based on transfer events is used to represent the scheduling problem and this model is a nonconvex MINLP model which presents multiple local optima. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Hence. SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Implementation of MRAC, SVMPC and PID control based on direct digital control application for dc servomotor by Mohamad Saleh, Saleha

    Published 2005
    “…The desired behavior of the adaptive controller is expressed by utilizing reference model, and the algorithms have been realized using the Lyapunov method and MIT rules. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system by Shahab, Suhail Najm

    Published 2017
    “…Metaheuristic optimization algorithms are used widely to solve many engineering problems. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Surface and Near-surface Moisture Content Assessment using Multi-Temporal Satellite Images over Perak Tengah and Manjung Regions, Malaysia by A. Hassaballa , Abdalhaleem, Matori , Abdul Nasir, M. Shafri, Helmi Z.

    Published 2013
    “…Secondly, a success rate curve based on spatiostatistical technique was used for validating the generalized maps in order to study the high-low distribution of θ within NOAA and MODIS generalized maps. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Fuzzy parameterized complex multi-fuzzy soft expert set theory and its application in decision-making by Al-Qudah, Yousef Ali Abed, Hassan, Mazlan, Hassan, Nasruddin

    Published 2019
    “…We then construct an algorithm based on this concept by converting it from the complex state to the real state. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  20. 20