Search Results - (( some applications a algorithm ) OR ( its application matching algorithm ))*

Refine Results
  1. 1

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Fingerprint verification has drawn a lot of attention on its approach in biometric since it is one of the most important biometric technologies nowadays and it is widely used in several different applications and areas. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…After that, in exploitation process, the algorithms will exploit the generated population to search for a desired home according to the preferences and its priority. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Detection and Recognition of Broken Character in Car Plate Image by Abd Halim, Suhaila, Zulkifli, Mohd Syazreen

    Published 2020
    “…Therefore, this study is concerned to develop a tool with recognition algorithm that able to detect the broken character on car plate by using Template Matching. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…SKF algorithms and its variants have been implemented in at least nine areas of applications: drill path optimization, airport gate allocation problem (AGAP), assembly sequence planning (ASP), system identification, feature selection, image template matching, controller tuning, wireless sensor network, and engineering design problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Preserving the topology of self-organizing maps for data analysis: A review by Bariah, Yusob, Zuriani, Mustaffa, Siti Mariyam, Shamsuddin

    Published 2020
    “…This paper presents detail explanation on SOM learning algorithm and its applications. Some issues related to SOM's architecture are also discussed, namely the formulation of training data from input samples, and the Best Matching Unit (BMU) identification for better visualization of large datasets, and improvement made to the SOM algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Keyword search for doa retrieval using N-gram / Anis Safuraa Ahmad Tajudin by Ahmad Tajudin, Anis Safura

    Published 2015
    “…There are some applications that require using the exact match of the keyword search with the words stored in the database. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design of photonic band gap aperture coupled fractal shape tri-band active antenna by Saeidi, Tale

    Published 2014
    “…Microwavefrequencies have a rangeof 300MHz to 300GHz, while according toFederal Communications commission (FCC) and Industrial, Scintific, Medical (ISM) band only some specific frequencies can be used for industrial applications;for instance 0.915 GHz, 1.8 GHz and 2.45 GHz were selected. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Semantic-Based Scalable Decentralized Resource Discovery by Mahamat Issa , Hassan, Azween, Abdullah

    Published 2010
    “…DA describes resource capabilities, and RA carries resource requests that are needed for some applications. We develop a RD algorithm that optimizes the search of the resources on the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Semantic-Based Scalable Decentralized Grid Resource Discovery by Mahamat Issa , Hassan, Azween, Abdullah

    Published 2009
    “…DA describes resource capabilities, and RA carries resource requests that are needed for some applications. We develop a RD algorithm that optimizes the search of the resources on the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Optimization of coded signals based on wavelet neural network by Ahmed, Mustafa Sami

    Published 2015
    “…When compared with other existing methods, WNN yields better PSR, low Mean Square Error (MSE), less noise, range resolution ability and Doppler shift performance than the previous and some traditional algorithms like auto correlation function (ACF) algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…Furthermore, the algorithms avoid computationally intensive correspondence problem by matching only the points of interest of a labeled pen to compute its position and orientation. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Additive and multiplicative noise removal based on adaptive wavelet transformation using cycle spinning by Khmag, Asem, Ramli, Abdul Rahman, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari

    Published 2014
    “…Moreover, the proposed algorithm matches the quality of the best redundant approaches, while maintaining a high computational efficiency and a low CPU/memory consumption.…”
    Get full text
    Get full text
    Get full text
    Article