Search Results - (( variable expansion function algorithm ) OR ( java applications out algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…It removes all the data dependences by expanding the variable with its dependence expression until the expression becomes only a function of known variables. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Signatory however use a special Digital Signature Application which store the secret private key. The application was programmed by JAVA FX. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Indoor temperature and humidity control using generalized predictive control-fuzzy cognitive map controller on direct expansion air conditioning system by Behrooz, Farinaz

    Published 2017
    “…Decreasing the energy usage of the air conditioning system are achieved by using the variable speed supply fan and variable speed compressor and applying the hybrid GPC-FCM Control design for preventing from losing energy by making the controller errors as least as possible.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Reducing of Inconsistent Data using Fuzzy Multi Attribute Decision Making for Accessing Data from Database by Yusof, Mohd Kamir, Abdul Rahman, Mohd Nordin, Azlan, Atiqah

    Published 2013
    “…The result indicates fuzzy multi attribute decision making is a suitable technique in reducing inconsistent data from database. Algorithm in fuzzy multi attribute decision making is able to find out a correct object.…”
    Get full text
    Get full text
    Article
  14. 14

    AI powered asthma prediction towards treatment formulation: an android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Md Muzahid, Abu Jafar, Sarker, Md Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    AI powered asthma prediction towards treatment formulation : An android app approach by Murad, Saydul Akbar, Adhikary, Apurba, Muzahid, Abu Jafar Md, Sarker, Md. Murad Hossain, Khan, Md. Ashikur Rahman, Hossain, Md. Bipul, Bairagi, Anupam Kumar, Masud, Mehedi, Kowsher, Md.

    Published 2022
    “…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Comparative modelling of strength properties of hydrated-lime activated rice husk-ash (HARHA) modified soft soil for pavement construction purposes by artificial neural network (AN... by Onyelowe, K. C., Alaneme, G. U., Onyia, M. E., Bui Van, D., Dimonyeka, M. U., Nnadi, E., Ogbonna, C., Odum, L. O., Aju, D. E., Abel, C., Udousoro, I. M., Onukwugha, E.

    Published 2021
    “…For the ANN model, feed forward back propagation and Levernberg Marquardt training algorithm were utilized for the model development with the optimized network architecture of 8-6-3 derived based on MSE performance criteria; while for the fuzzy logic model, the mamdani FIS with both triangular and trapezoidal membership function with both models formulated, simulated and computed using MATLAB toolbox. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design and implementation of a single-phase to three-phase space-vector pwm-based matrix converter system for induction motor drives by Velu, Vengadeshwaran

    Published 2016
    “…These unique findings provide more opportunity for further expansion of research to attain a higher voltage ratio with balanced voltages and less percentage total harmonic distortion. …”
    Get full text
    Get full text
    Thesis
  20. 20