Search Results - (( variable based verification algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- verification algorithm »
- optimisation algorithm »
- based verification »
- java application »
- variable »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
3
Daily streamflow forecasting using simplified rule-based fuzzy logic system
Published 2011Get full text
Article -
4
-
5
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…This difference in the produced signature is referred to as intra-user variability. Verification difficulty occurs especially in the case where the feature extraction and classification algorithms are designed to classify a stable length vector of input features. …”
Get full text
Get full text
Article -
6
-
7
Development of biosignals-based multimodal biometric system
Published 2014“…The best performance of the work is based on simple-sum score fusion with a piecewiselinear normalization technique which provides an EER of 0. 7%.…”
Get full text
Get full text
Get full text
Thesis -
8
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
9
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
10
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
11
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…FE model was developed and validated based on Z. Ahmad FE model. Based on the verification process, deformation mode and energy absorption predicted by the developed FE model agree with the validated FE model. …”
Get full text
Get full text
Conference or Workshop Item -
12
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Further experimental setup was carried out for comparative evaluation and the MPPT algorithm was implemented to performance verification of the algorithm by using digital signal processor (TMS320F28335). …”
Get full text
Get full text
Thesis -
13
A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive
Published 2010“…This thesis proposed a design and implementation of a PLC-based hybrid controller from a basic PLC to a PWM-driven variable-voltage variable-frequency (VVVF) speed control of an induction motor and the analysis, evaluation and improvement of the control strategies. …”
Get full text
Get full text
Thesis -
14
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
15
Hybrid ANN and Artificial Cooperative Search Algorithm to Forecast Short-Term Electricity Price in De-Regulated Electricity Market
Published 2019“…Therefore, this research proposes a hybrid method for electricity price forecasting via artificial neural network (ANN) and artificial cooperative search algorithm (ACS). In parallel, a feature selection technique based on the combination of mutual information (MI) and neural network (NN) is developed in this study to select the input variables subsets, which have substantial impact on forecasting of electricity price. …”
Get full text
Get full text
Article -
16
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
17
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The system is constructed from model-based design (MBD) of the PV system. The MBD is divided into four parts; executable system properties, design and simulation of the properties, execution and implementation for code generation and verification process. …”
Get full text
Get full text
Thesis -
18
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Additionally, the research restricts the number of variables through feature selection to enhance the performance of the algorithm. …”
Get full text
Get full text
Thesis -
19
Agent-Based Model of Virtual Community Cohesion (S/O: 13443)
Published 2021“…Also, it is shown that agents' behaviour based on individual attributes can reduce the variability of cohesion levels. …”
Get full text
Get full text
Monograph -
20
Analytical Modelling And Efficiency Optimisation Of Permanent Magnet Synchronous Machine Using Particle Swarm Optimisation
Published 2018“…Subsequently, an intelligent computational algorithm - Particle Swarm Optimization (PSO) was later applied to all the machine variables simultaneously to find the optimal solution for a compromised optimal machine performance. …”
Get full text
Get full text
Thesis
