Search Results - (( time realization _ algorithm ) OR ( pattern detection path algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Realization of microcontroller-based polarization control system with genetic algorithm by Mamdoohi, Ghazaleh, Esmaeilian-Marnani, Aida, Abas, Ahmad Fauzi, Samsudin, Khairulmizam, Hidayat, Ariya, Ibrahim, Noor Hisham, Mahdi, Mohd Adzir

    Published 2009
    “…To reach optimum performance, the code is optimized by using the best genetic parameter to achieve the fastest execution time. This algorithm consumes low size of memory besides providing fast speed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Adaptive smoothness constraint image multilevel fuzzy enhancement algorithm by Xi, Chu, Zhou, Zhixiang, Yang, Chaoshan, Xiang, Xiaoju

    Published 2019
    “…For the problems of poor enhancement effect and long time consuming of the traditional algorithm, an adaptive smoothness constraint image multilevel fuzzy enhancement algorithm based on secondary color-to-grayscale conversion is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Simple realization of 5-Segment discontinuous SVPWM based on FPGA by Sutikno, Tole, Jidin, Auzani, Basar, Mohd Farriz

    Published 2010
    “…Employing Field Programmable Gate Array (FPGA) to realize SVPWM strategies provides advantages that it is considered as an appropriate solution to boost system performance of an SVPWM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    LS-SVM Hyper-parameters Optimization Based on GWO Algorithm for Time Series Forecasting by Zuriani, Mustaffa, Mohd Herwan, Sulaiman, M. N. M., Kahar

    Published 2015
    “…Realized in commodity time series data, the proposed technique is compared against two comparable techniques, including single GWO and LSSVM optimized by Artificial Bee Colony (ABC) algorithm (ABC-LSSVM). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity by Sahib, Mouayad A., Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2012
    “…However, NLFXLMS cannot be implemented in real time because the modeling of the SEF cannot be realized. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Bus scheduling algorithm for UiTM Shah Alam / Muhd Hisyam Nursalam Ahmad Pauzi by Ahmad Pauzi, Muhd Hisyam Nursalam

    Published 2017
    “…Dijkstra algorithm is one of the technique use in calculating the arrival time with high accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm by Khor, Lay Hoong

    Published 2006
    “…Producing the VHDL code is the most difficult and time-consuming part throughout this project. In the second stage, the design is realized using the FPGA board. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
    Get full text
    Get full text
    Monograph
  18. 18

    Parallel Processing of Forward-backward Time-stepping Method for Time Domain Inverse Scattering by Kismet, Hong Ping, Moriyama, Toshifumi, Yamaguchi, Yuji, Tanaka, Toshiyuki, Takenaka, Takashi

    Published 2008
    “…A cluster of 8 PCs is constructed and parallel processing is realized using MPI. A 3-D reconstruction of wooden hollow cylinder from the experimental data is examined by parallel FBTS algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors by Binajjaj, Saeed Ali Saeed

    Published 2010
    “…The imaging algorithm was based on a non-linear optimization technique from which the single-step and iterative inversion schemes were realized. …”
    Get full text
    Get full text
    Thesis
  20. 20