Search Results - (( verification implementation case algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Functionality verification is done using the test case provided by National Institute Standards and Technology (NIST). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…Today, model checking techniques and corresponding tools are widely applied in diverse case driven scenarios, the safety critical ones in particular. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Simulation of the flow pattern around spur dykes using FLUENTS by Othman A. Karimb, K.H.M. Ali

    Published 1999
    “…Extensive testing procedures have been implemented to ensure that the equations and solution algorithms used by FLUENT would provide an accurate simulation of flow. …”
    Get full text
    Get full text
    Article
  6. 6

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  7. 7

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy Mixed Assembly Line Sequencing and Scheduling Optimization Model Using Multiobjective Dynamic Fuzzy GA by Zahari, Taha, Farzad, Tahriri, Siti Zawiah, Md Dawal

    Published 2014
    “…Trapezoidal fuzzy numbers are implemented for variables such as operation and travelling time in order to generate results with higher accuracy and representative of real-case data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The frequency before and after damage was set as input training data, whereas the damage types and locations are set as output data (damage index). The verification results indicate that all the structural defects were predicted with high accuracy by the developed hybrid algorithm in cases of healthy and damaged structures. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Median polish techniques for analysing paired data by Ajoge, Idris

    Published 2017
    “…We extend the analysis of paired data for the case of missing values. Later, exercising of comparison values in a two-way median polish for paired data was implemented to verifying the association between rows and columns effects. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A novel approach towards tamper detection of digital holy Quran generation by Islam, Md. Milon, Kabir, M. Nomani, Sadi, Muhammad Sheikh, Morsalin, Md. Istiak, Haque, Ahsanul, Wang, Jing

    Published 2020
    “…We propose a novel approach for the tamper detection of a digital document of the Holy Quran. We have implemented a desktop application, having modified UI that utilizes Jaro-Winkler distance and Difflib function as String Edit distance algorithm to highlight the words in the Holy Quran for the verification purpose. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…This implementation increases the level of synchronization of CMs with a cluster head, thereby increasing cluster stability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…In order to develop an efficient ANN system, the required algorithm is built through trial and error procedure and then through this process feed-forward network with back-propagation training function is implemented. …”
    Get full text
    Get full text
    Thesis