Search Results - (( variable extraction path algorithm ) OR ( some contributing function algorithm ))

Refine Results
  1. 1

    Multi-Objective Optimization of Solar Powered Irrigation System by Using Genetic Algorithm by Mohd Tholaat, Muhammad Ali Husaini

    Published 2015
    “…Initial range of [1; 2] and crossover fraction of 1.0 have majorly contributed to the optimal search parameters. After some tuning to get the best setting, the simulation shows that the fitness function of 3 objectives resulted with 17.4303 kW power output, 15.2355% efficiency and $143,533.10 fiscal savings. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…A common practice now is to extract the sub models out of the giant models based upon the slicing criteria. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…With this information the system is able to produce results that can gives the user some useful information which can contribute in the later construction of khutbah texts. …”
    Get full text
    Get full text
    Thesis
  6. 6

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…Extensive testing, including unit, integration, and acceptance testing, has validated the system's functionality, although limitations such as a focus on XSS testing tools and some accuracy concerns were identified. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Motion learning using spatio-temporal neural network by Yusoff, Nooraini, Ahmad, Farzana Kabir, Jemili, Mohamad Farif

    Published 2020
    “…However, most of the studies are based on sigmoidal neural networks in which some dynamic properties of the data are overlooked due to the absence of spatiotemporal encoding functionalities. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An Improved Evolutionary Algorithm in Formulating a Diet for Grouper by Cai-Juan, Soong, Abd Rahman, Rosshairy, Ramli, Razamin

    Published 2023
    “…A semi random initialization operator is introduced to filter some important constraints thus increase the chances of obtaining feasible formulations or solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions by Shamshad, H., Ullah, F., Ullah, A., Kebande, V.R., Ullah, S., Al-Dhaqm, A.

    Published 2023
    “…Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. …”
    Get full text
    Get full text
    Article
  11. 11

    AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR by YEO, YEO SOCK CHUANG

    Published 2013
    “…This study shows that this algorithm could add more value to the function of thin blood smear by eliminating the separated processes of detecting and counting parasitemia using two types of blood smears. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Design/methodology/approach – The hypotheses of the study were tested using personally administered survey questionnaires; the study obtained 486 valid questionnaires, which were evaluated using SmartPLS Algorithm and bootstrapping functions. Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Designing of skull defect implants using C1 rational cubic Bezier and offset curves by Najihah, Mohamed, Ahmad, Abd Majid, Abd Rahni, Mt Piah, Zainul, Ahmad Rajion

    Published 2015
    “…All the phases contribute significantly in making our proposed technique automated. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system by Faisal, Ali Raed

    Published 2016
    “…The beamformer obtained with the objective function of sum rate maximization achieves a spectral eficiency of 15.3% compared to BPSO BF in some of the conducted scenarios.…”
    Get full text
    Get full text
    Thesis
  15. 15

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…Popular hash functions are Message Digest 4/5 (MD-4/5), Secure Hashing Algorithm (SHA-0/1) and RIPEMD, which are referred to as MDx-class hash functions due to some commonalities in their design with the MD-family. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Extended Haar Wavelet Quasilinearization method for solving boundary value problems / Nor Artisham Che Ghani by Nor Artisham , Che Ghani

    Published 2018
    “…All the values of Haar wavelet functions are substituted into the quasilinearized problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani by Che Ani, Adi Izhar

    Published 2023
    “…Hemiplegics can recover or at least regain some function. However, if the patient is not appropriately treated, the consequences of the chronic stage will be long-lasting. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…In our method we have employed Support Vector Machine as one of the best machine learning algorithm for classification and we contribute a new fuzzy membership function thus removing the Support Vector Machine’s weakness points in NER precision and multi classification. …”
    Get full text
    Get full text
    Article
  19. 19

    Collaborative-based web recommender system for community-driven homestay programmes by Miraz, Mahadi Hasan

    Published 2017
    “…All these operations are carried out simultaneously to boost the functions of the CBWR system. Hence, this research contributes to the development of a specific unique web database and a CBWR system, which is adopted from collaborative algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis