Search Results - (( work motivation a algorithm ) OR ( _ application system algorithm ))

Refine Results
  1. 1

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Frequency variations measurement techniques in power quality monitoring by Wood, Terence

    Published 2008
    “…Power quality is a term used to describe electric power that motivates an electrical load and the load's ability to function properly with that electric power. …”
    Get full text
    Get full text
    Thesis
  4. 4

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…The algorithm is utilized for predicting a huge set of unlabeled data, given a small number of labelled data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Intelligent Energy Management in Residential Building by Zubair, Nur Faizah

    Published 2014
    “…Residential building has high consumption of energy especially electrical energy. This motivates researchers to work on how to improve residential building energy efficiency. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes) by Low, Chiau Thian

    Published 2017
    “…The motivation is to make encryption process as short as possible to aid in increasing a system's ability to process large amount of data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee by Chong , Hue Yee

    Published 2023
    “…In this research work, the motivation is to develop an autonomous learning model based on the hybridization of an adaptive ANN and a metaheuristic algorithm for optimizing ANN parameters so that the network could perform learning and adaptation in a more flexible way and handle condition classification tasks more accurately in industries, such as in power systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Survey on language processing algorithm for sign language synthesizer by Maarif, Haris Al Qodri, Akmeliawati, Rini, Gunawan, Teddy Surya

    Published 2017
    “…In this paper, we provide a comprehensive review on the work in SL synthesizer development. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Survey on job scheduling mechanisms in grid environment by S. M., Argungu, Che Mohamed Arif, Ahmad Suki, Omar, Mohd Hasbullah

    Published 2015
    “…Grid systems provide geographically distributed resources for both computational intensive and data-intensive applications.These applications generate large data sets.However, the high latency imposed by the underlying technologies; upon which the grid system is built (such as the Internet and WWW), induced impediment in the effective access to such huge and widely distributed data.To minimize this impediment, jobs need to be scheduled across grid environments to achieve efficient data access.Scheduling multiple data requests submitted by grid users onto the grid environment is NP-hard.Thus, there is no best scheduling algorithm that cuts across all grids computing environments.Job scheduling is one of the key research area in grid computing.In the recent past many researchers have proposed different mechanisms to help scheduling of user jobs in grid systems.Some characteristic features of the grid components; such as machines types and nature of jobs at hand means that a choice needs to be made for an appropriate scheduling algorithm to march a given grid environment.The aim of scheduling is to achieve maximum possible system throughput and to match the application needs with the available computing resources.This paper is motivated by the need to explore the various job scheduling techniques alongside their area of implementation.The paper will systematically analyze the strengths and weaknesses of some selected approaches in the area of grid jobs scheduling.This helps researchers better understand the concept of scheduling, and can contribute in developing more efficient and practical scheduling algorithms.This will also benefit interested researchers to carry out further work in this dynamic research area.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  11. 11

    The implementation of fault management in distribution system using distribution automation system (DAS) in conjunction with SCADA by Ab Ghani, Mohd Ruddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar, Baharudin, Zikri Abadi, Wan Jusoh, Wan Nor Shela Ezwane

    Published 2012
    “…The major consideration in this work is to identify fault management strategy for switching circuit breaker to be implemented as new algorithm technique in SCADA. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…For future work, the prototype can be further enhanced as one of the mobile application. …”
    thesis::doctoral thesis
  13. 13

    A hybrid constraint-based programming approach to design a sports tournament scheduling by Soong, Chai Juan, Ramli, Razamin, Ibrahim, Haslinda

    Published 2011
    “…Subsequently,previous work related to the problem is discussed. Thus, we present an innovative hybrid of a constraint-based algorithm and a neighbourhood search, which is an exploration into alternative and improved methodology in the problem of sports tournament scheduling with special multiple constraints. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Evaluation of Real-Time Visio-Haptic Deformable Bovine Rectal Palpation Simulator by Ahmad, Irshad, Sulaiman, Suziah

    Published 2010
    “…The implementation proposed is motivated by an existing simulator of a reproductive system used for diagnosing different internal parts which lacks visual deformation features; hence, realism is reduced. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…With the successful modeling and simulation of the AREVA MiCOM P441 distance relay and its recording facility, such subsequent works as data extraction and preparation, computational intelligence-based data mining for relay decision algorithm discovery and finally a relay analysis expert system development can certainly be executed. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Omnidirectional Configuration and Control Approach on Mini Heavy Loaded Forklift Autonomous Guided Vehicle by Norsharimie, Adam, Mohd, Aiman, Wan Mohd, Nafis, Addie Irawan, Hashim, Mohamad, Muaz, Mohamad, Hafiz, A. R., Razali, Sheikh Norhasmadi, Sheikh Ali

    Published 2016
    “…Pekan, Pahang in order to have a customized mini forklift that able to work in a very confined warehouse (170cm x 270cm square) with heavy payload in a range of 20-200kg. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item