Search Results - (( variable detection path algorithm ) OR ( some contributing function algorithm ))
Search alternatives:
- contributing function »
- variable detection »
- function algorithm »
- some contributing »
- detection path »
- path algorithm »
-
1
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
2
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
3
LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri
Published 2017“…In order to remove the uninformative variables, cumulative adaptive reweighted sampling (CARS) has been performed. …”
Get full text
Get full text
Thesis -
4
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2017“…In order to remove the uninformative variables, variable selection using cumulative adaptive reweighted sampling (CARS) has been performed. …”
Get full text
Get full text
Get full text
Article -
5
Multi-Objective Optimization of Solar Powered Irrigation System by Using Genetic Algorithm
Published 2015“…Initial range of [1; 2] and crossover fraction of 1.0 have majorly contributed to the optimal search parameters. After some tuning to get the best setting, the simulation shows that the fitness function of 3 objectives resulted with 17.4303 kW power output, 15.2355% efficiency and $143,533.10 fiscal savings. …”
Get full text
Get full text
Final Year Project -
6
Classification and quantification of palm oil adulteration via portable NIR spectroscopy
Published 2024“…In order to remove the uninformative variables, variable selection using cumulative adaptive reweighted sampling (CARS) has been performed. …”
Article -
7
Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam
Published 2004“…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
Get full text
Get full text
Thesis -
8
Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224)
“…The developed algorithm weighted the n objects contribution in explaining the separation between groups. …”
Get full text
Get full text
Monograph -
9
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…With this information the system is able to produce results that can gives the user some useful information which can contribute in the later construction of khutbah texts. …”
Get full text
Get full text
Thesis -
10
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…Extensive testing, including unit, integration, and acceptance testing, has validated the system's functionality, although limitations such as a focus on XSS testing tools and some accuracy concerns were identified. …”
Get full text
Get full text
Get full text
Article -
11
Motion learning using spatio-temporal neural network
Published 2020“…However, most of the studies are based on sigmoidal neural networks in which some dynamic properties of the data are overlooked due to the absence of spatiotemporal encoding functionalities. …”
Get full text
Get full text
Get full text
Article -
12
An Improved Evolutionary Algorithm in Formulating a Diet for Grouper
Published 2023“…A semi random initialization operator is introduced to filter some important constraints thus increase the chances of obtaining feasible formulations or solutions. …”
Get full text
Get full text
Get full text
Article -
13
Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions
Published 2023“…Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. …”
Get full text
Get full text
Article -
14
AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR
Published 2013“…This study shows that this algorithm could add more value to the function of thin blood smear by eliminating the separated processes of detecting and counting parasitemia using two types of blood smears. …”
Get full text
Get full text
Final Year Project -
15
Does organizational culture matter in the relationship between trust and SMEs performance
Published 2018“…Design/methodology/approach – The hypotheses of the study were tested using personally administered survey questionnaires; the study obtained 486 valid questionnaires, which were evaluated using SmartPLS Algorithm and bootstrapping functions. Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
Get full text
Get full text
Get full text
Article -
16
Designing of skull defect implants using C1 rational cubic Bezier and offset curves
Published 2015“…All the phases contribute significantly in making our proposed technique automated. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system
Published 2016“…The beamformer obtained with the objective function of sum rate maximization achieves a spectral eficiency of 15.3% compared to BPSO BF in some of the conducted scenarios.…”
Get full text
Get full text
Thesis -
18
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Popular hash functions are Message Digest 4/5 (MD-4/5), Secure Hashing Algorithm (SHA-0/1) and RIPEMD, which are referred to as MDx-class hash functions due to some commonalities in their design with the MD-family. …”
Get full text
Get full text
Thesis -
19
Extended Haar Wavelet Quasilinearization method for solving boundary value problems / Nor Artisham Che Ghani
Published 2018“…All the values of Haar wavelet functions are substituted into the quasilinearized problem. …”
Get full text
Get full text
Get full text
Thesis -
20
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…Hemiplegics can recover or at least regain some function. However, if the patient is not appropriately treated, the consequences of the chronic stage will be long-lasting. …”
Get full text
Get full text
Thesis
