Search Results - (( using function based algorithm ) OR ( post implementation a algorithm ))
Search alternatives:
- post implementation »
- implementation a »
- using function »
- a algorithm »
-
1
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Term Frequency-Inverse Document Frequency (TF-IDF) algorithm is performed for text search, where it satisfies multiple keywords at a time and the search result for review is based on relevancy score. …”
Get full text
Get full text
Thesis -
4
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
5
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). …”
Get full text
Get full text
Get full text
Article -
6
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…HHT is a way to decompose a signal into intrinsic mode function (IMF). …”
Get full text
Get full text
Article -
7
Finger Exoskeleton for Early Acute Post Stroke Rehabilitation: Control Design and Performance Analysis
Published 2023Conference Paper -
8
An intelligent adjustable spanner for automated engagement with multi-diameter bolts/nuts during tightening/loosening process using vision system and fuzzy logic
Published 2018“…The fuzzy logic-based decision-making algorithm is applied to the images resulting from the postprocessing stage in order to do a final decision on the diameter of the bolt/nut and approximate it to the nearest standards diameter. …”
Get full text
Get full text
Get full text
Article -
9
The Use of Transmission Line Modelling to Test the Effectiveness of I-kaz as Autonomous Selection of Intrinsic Mode Function
Published 2017“…This paper proposed the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-kaz) to kurtosis ratio (I-kaz-Kurtosis) for that allows automatic selection of intrinsic mode function (IMF) that's should be used. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Artificial neural network (ANN) as post-processing stage for chemically selective field effect transistor (CHEMFET) sensor selectivity based-on ion concentration / Nurhakimah Abd A...
Published 2016“…In this study, the sensor voltage response was acquired to act as input data while sample concentrations which set from 10"6 to 10"1 mol/L was used as target for training data. The sensor voltage response used has been measured and also generated based on CHEMFET sensor modeling by using MATLAB software. …”
Get full text
Get full text
Thesis -
11
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. …”
Get full text
Get full text
Thesis -
12
Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani
Published 2023“…In the human gait model, three Machine Learning algorithms were used: Gaussian Process Regression, Support Vector Machine, and Decision Tree. …”
Get full text
Get full text
Thesis -
13
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
Get full text
Get full text
Thesis -
14
Intentional Islanding Solution Based on Modified Discrete Particle Swarm Optimization Technique
Published 2023Conference Paper -
15
Crosssover-first different evolution: a comprehensive post- Hoc analysis
Published 2017“…Implementation details explained clearly with a comprehensive post-hoc statistical analysis to support the algorithm. …”
Get full text
Get full text
Book -
16
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
Get full text
Get full text
Thesis -
17
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
18
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
Get full text
Get full text
Get full text
Article -
19
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…A general method for post-processing of field data with high order tetrahedra is presented. …”
Get full text
Get full text
Thesis -
20
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
Get full text
Get full text
Conference or Workshop Item
