Search Results - (( using identification cell algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…The ability to construct accurate mathematical models of real systems is an important part of the control parameters in prototype PEM fuel cell systems for vehicles. Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
    Get full text
    Get full text
    Book Section
  5. 5
  6. 6
  7. 7

    A New Cell Formation Method Considering Operation Sequences And Production Volumes by Abedini, Panteha

    Published 2013
    “…Identification of machines and parts in each cell, known as cell formation, is the core and critical step component of cellular layout. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Red blood cells classification with sharpening segmentation and mask R-CNN by Arianti, Nunik Destria, Muda, Azah Kamilah, Ahmad, Norashikin

    Published 2023
    “…Nevertheless, manual visual inspection is arduous and subjective, leading to variance in RBC identification and counting. This paper proposes classification using sharpening segmentation combined with the algorithm mask R-CNN to increase the accuracy of calculating the number of RBCs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…In this paper, we present an implementation of a security system based on voice identification as the access control key. Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Model predictive control for MPPT of distributed photovoltaic module by Jowalin, Wellfred

    Published 2017
    “…A conventional P&O technique was design by develop the algorithm to compare the result. A plant using system identification developed as the MPC needs a plant for prediction. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Morphology, molecular characterization and habitat preference of harmful Benthic dinoflagellate gambierdiscus (Dinophyceae) in Malaysia / Nurin Izzati Mustapa by Nurin Izzati , Mustapa

    Published 2020
    “…Morphological information and the distribution of Gambierdiscus species were used to develop a comprehensive taxonomic database of Gambierdiscus, and a 3I web-based interactive identification key for species identification is presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…This approach capable to predict metabolic pathway of S.cerevisiae with 87 percent accuracy compared to 80 percent accuracy using PathoLogic algorithm…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Computer aided system for dendritic cells detection and counting by Muhd Suberi, Anis Azwani

    Published 2017
    “…As DCs counting are crucial in most cancer treatment procedures, this research proposes a pioneering system called CasDC (Computer Aided System for Dendritic Cells identification) which implements an image processing algorithm to recognise and count DCs with a label-free method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria by Pawar, Shrikant, Bramha Chari, P. V., Lahiri, Chandrajit *

    Published 2019
    “…Moreover, biological network visualization techniques and analysis enabled the identification of QSPs in different bacteria using related information from the curated databases. …”
    Get full text
    Get full text
    Book Section
  19. 19
  20. 20