Search Results - (( using function method algorithm ) OR ( pre implementation using algorithm ))

Refine Results
  1. 1

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…The results of the algorithm show significant improvement in comparison to a similar implementation of the hard c-means algorithm.…”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4

    Comparison Of Phylogenetic Trees Using Difference Distance Function Method by Maziah, Medin

    Published 2005
    “…The pre-processing is implemented using the Microsoft Visual C++. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Least Square QR Decomposition Method for Solving the Inverse Problem in Functional Near Infra-Red Spectroscopy by Hussain, A., Faye, I., Muthuvalu, M.S., Tong Boon, T.

    Published 2021
    “…The sensitivity matrix is being generated using the Monte Carlo (MC) simulation. For image reconstruction, the numerical algorithm for the LSQR method is created and implemented in MATLAB. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Real-time identification of an unmanned quadcopter flight dynamics using fully tuned radial basis function network by Pairan, Mohammad Fahmi

    Published 2018
    “…Recursive system identification based on neural network (NN) offers an alternative method for quadcopter dynamics modelling. Recursive learning algorithms, such as Constant Trace (CT) can be implemented to solve insufficient training data and over-fitting problems by developing a new model from real-time flight data in each time step. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…In the industry, the proportional-integral-derivative (PID) controller is the control method that has been widely implemented because of its simplicity, the fact that it is more understandable and more reliable to be used for industrial purposes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…In the industry, the proportional-integral-derivative (PID) controller is the control method that has been widely implemented because of its simplicity, the fact that it is more understandable and more reliable to be used for industrial purposes. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…Nevertheless, AC is not required for LCM if the original multi-spectral image is used. The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period by Zulkarnain, Norsyahidah, Mohammad, Nurul Farahain, Ahmed Shogar, Ibrahim Adam

    Published 2023
    “…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Fault diagnosis in unbalanced radial distribution networks using generalised regression neural network by Mirzaei, Maryam

    Published 2011
    “…Using the proposed method, less learning time of PNN is required for classification. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Intelligent Fuzzy Classifier for Pre-Seizure Detection from Real Epileptic Data by Shakir, Mohamed, Malik, Aamir Saeed, Kamel, Nidal S., Qidwai, Uvais

    Published 2014
    “…In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of preseizures in real/raw Epilepsy data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…In order to improve the security and confidentiality of the system, this system will also use the hashing function to complete. Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis