Search Results - (( based applications testing algorithm ) OR ( _ applications window algorithm ))

Refine Results
  1. 1
  2. 2

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…This thesis gives a systematic investigation of various MLP learning mainly Sliding Window (SW) learning mode which is treated as the adaptation of offline algorithms into online application Consequently this thesis reviews various offline algorithms including: batch backpropagation, nonlinear conjugate gradient, limited memory and full-memory Broyden, Fletcher, Goldfarb and Shanno algorithms and different forms of the latest proposed bimary ensemble learning. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Local Stereo Matching Algorithm Using Small-Color Census Spared Adaptive Support Weight by Nayan, M Yunus

    Published 2011
    “…This work is still on process, to test the algorithm; it will use the Middlebury benchmark. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Adaptive regularizer for recursive neural network training algorithms by Asirvadam, Vijanth Sagayan

    Published 2008
    “…Adaptive Marquardt parameter correction techniques are tested for recursive Levenberg-Marquardt (RLM) and proposed novel application on decomposed recursive Levenberg Marquardt (DRLM) algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…An approach capable of recognizing an audio piece of music with an accuracy equal to 90% was further tested based on this result. In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  11. 11

    Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi by Ahmad Tarmizi, Muhammad Danial

    Published 2020
    “…Objectives of this project is to design the flow of the system, developed in Window application and test the functionality of the system and reliability for the predictive model. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Memristor based ring oscillators true random number generator with different window functions for applications in cryptography by Hashim N.A.N., Loong J.T.H., Ghazali A., Hamid F.A.

    Published 2023
    “…Cryptographic applications require numbers that are random and pseudorandom. …”
    Article
  15. 15
  16. 16
  17. 17

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…This research addresses the critical issue of detecting unknown tags, focusing on optimizing processing time and energy efficiency in terms of memory usage when detecting these tags. A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Third, to formulate an equation to automate the configuration of ʎmax parameter in order to increase the scalability of AF-based CCA. Fortunately, the results confirm the validity of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems by Ary, Maxsi

    Published 2025
    “…For objective two, three routing strategies were evaluated. Based on a single-vehicle optimal route, the algorithm provided the shortest distance, 91.74 km. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Video Object Avoidance Implementation on Embedded Platform by Keat, Yeong Ming

    Published 2015
    “…Both motion and static detection algorithms will be tested in Window Visual Studio 2010, before implementing them into the embedded platform, which is Raspberry Pi. …”
    Get full text
    Get full text
    Final Year Project