Search Results - (( convention notification based algorithm ) OR ( based optimization isotherm algorithm ))
Search alternatives:
- convention notification »
- optimization isotherm »
- notification based »
-
1
-
2
A smart guidance indoor parking system based on Dijkstra's algorithm and ant colony algorithm
Published 2020“…This paper introduces a smart guidance indoor parking system based on embedded system integrated with both the Dijkstra's algorithm and Ant Colony algorithm (ACO) to provide drivers with an efficient path to the nearest parking bay. …”
Get full text
Get full text
Get full text
Article -
3
A gauss-newton approach for nonlinear optimal control problem with model-reality differences
Published 2017“…Here, the linear model-based optimal control model is considered, so as the optimal control law is constructed. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Fire alarm system with real-time monitoring and alert system using IOT / Muhammad Habib Shaharuddin
Published 2024“…By utilising IoT sensors, wireless connectivity, and cloud-based platforms, the suggested system seeks to improve conventional fire detection techniques and offer quick and precise fire detection, instantaneous notifications, and remote monitoring. …”
Get full text
Get full text
Student Project -
6
-
7
DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS
Published 2018“…Density of the traffic is calculated by the algorithm that have various variables. The system will synchronize with Android Application, which can show the notification of alert system, level of traffic congestion and real-time sensors data for each junction. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Production and characterization of biochar derived from oil palm wastes, and optimization for zinc adsorption
Published 2015“…The incremental back propagation algorithm demonstrated the best results and which has been used as learning algorithm for ANN in combination with Genetic Algorithm in the optimization. …”
Get full text
Get full text
Thesis -
9
Detection of SQL injection attack using machine learning
Published 2024“…SQL injection (SQLI) refers to a specific type of security vulnerability that occurs when unauthorised SQL code is inserted into web applications to compromise databases, leading to potential consequences such as data breaches, server disruptions, and data loss within an organisational context. Based on the literature review findings, it has been observed that conventional techniques employed for detecting SQLI attacks often exhibit limitations in their effectiveness and suffer from various drawbacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Modeling of Cu(II) adsorption from an aqueous solution using an Artificial Neural Network (ANN)
Published 2020“…The Fletcher-Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
Get full text
Get full text
Article -
12
Modelling and simulation of hollow profile aluminium extruded product
Published 2015“…This process is an isothermal process with an extrusion ratio of 3.3. Subsequently, the optimized algorithm for these extrusion parameters was suggested based on the simulation results. …”
Get full text
Get full text
Get full text
Article -
13
Modeling of cu(ii) adsorption from an aqueous solution using an artificial neural network (ann)
Published 2020“…The Fletcher–Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis
