Search Results - (( verification implementation case algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- verification implementation »
- application optimisation »
- optimisation algorithm »
- implementation case »
- java application »
- case algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Functionality verification is done using the test case provided by National Institute Standards and Technology (NIST). …”
Get full text
Get full text
Thesis -
3
Case driven TLC model checker analysis in energy scenario
Published 2023“…Today, model checking techniques and corresponding tools are widely applied in diverse case driven scenarios, the safety critical ones in particular. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
Get full text
Get full text
Thesis -
5
Simulation of the flow pattern around spur dykes using FLUENTS
Published 1999“…Extensive testing procedures have been implemented to ensure that the equations and solution algorithms used by FLUENT would provide an accurate simulation of flow. …”
Get full text
Get full text
Article -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
Get full text
Get full text
Thesis -
8
Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA
Published 2014“…Trapezoidal fuzzy numbers are implemented for variables such as operation and travelling time in order to generate results with higher accuracy and representative of real-case data. …”
Get full text
Get full text
Get full text
Article -
9
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The frequency before and after damage was set as input training data, whereas the damage types and locations are set as output data (damage index). The verification results indicate that all the structural defects were predicted with high accuracy by the developed hybrid algorithm in cases of healthy and damaged structures. …”
Get full text
Get full text
Thesis -
10
Median polish techniques for analysing paired data
Published 2017“…We extend the analysis of paired data for the case of missing values. Later, exercising of comparison values in a two-way median polish for paired data was implemented to verifying the association between rows and columns effects. …”
Get full text
Get full text
Thesis -
11
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A novel approach towards tamper detection of digital holy Quran generation
Published 2020“…We propose a novel approach for the tamper detection of a digital document of the Holy Quran. We have implemented a desktop application, having modified UI that utilizes Jaro-Winkler distance and Difflib function as String Edit distance algorithm to highlight the words in the Holy Quran for the verification purpose. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad
Published 2019“…This implementation increases the level of synchronization of CMs with a cluster head, thereby increasing cluster stability. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of finite element model for soil-structure interaction
Published 2014“…In order to develop an efficient ANN system, the required algorithm is built through trial and error procedure and then through this process feed-forward network with back-propagation training function is implemented. …”
Get full text
Get full text
Thesis
