Search Results - (( wave application testing algorithm ) OR ( some applications matching algorithm ))

Refine Results
  1. 1
  2. 2

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. The results of False Matching Ratio (FMR) was 16.67% whilst the False Non-Matching Ratio (FNMR) was 33.33%. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  4. 4

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
    Get full text
    Get full text
    Student Project
  7. 7
  8. 8
  9. 9

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…There are two main processes involved in ABC Algorithm which are exploration and exploitation. In the exploration process, the algorithm will search for a population of house that matches with home buyers’ financial availability. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…The signals were then clustered using the feature extraction algorithms. This paper tested two feature extraction algorithms namely Principal Component Analysis (PCA) and Auto-Regressive (AR). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Detection and Recognition of Broken Character in Car Plate Image by Abd Halim, Suhaila, Zulkifli, Mohd Syazreen

    Published 2020
    “…Therefore, this study is concerned to develop a tool with recognition algorithm that able to detect the broken character on car plate by using Template Matching. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…The work initially investigates the feasibility of using the DC distribution system to power the locally available AC appliances, that are analyzed and evaluated individually to match the DC supply either by direct coupling or some modification. …”
    Get full text
    Get full text
    Thesis
  20. 20