Search Results - (( developing building evolution algorithm ) OR ( java identification using algorithm ))
Search alternatives:
- identification using »
- evolution algorithm »
- java identification »
- building evolution »
- using algorithm »
-
1
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Nature-Inspired cognitive evolution to play Ms. Pac-Man
Published 2011“…The focus of this research is to explore the hybridization of nature-inspired computation methods for optimization of neural network-based cognition in video games, in this case the combination of a neural network with an evolutionary algorithm. In essence, a neural network is an attempt to mimic the extremely complex human brain system, which is building an artificial brain that is able to self-learn intelligently. …”
Get full text
Get full text
Get full text
Article -
10
Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network
Published 2021“…In this work, LTE-A network building and deployment as well as configuration management through radio resources allocation and system level performance evaluation for the Proposed TVWS, MIF and CONV handover decision algorithms were successfully carried out. …”
Get full text
Get full text
Conference or Workshop Item -
11
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Artificial intelligence (AI) and its application in architecture design: a thematic review
Published 2025“…Future studies are expected to focus on refining algorithms and integrating AI more closely with architectural tools to boost efficiency and sustainability in building design and project management, in addition to organizational influences aimed at advancing building sustainability.…”
Get full text
Get full text
Get full text
Article -
13
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Regression test case prioritisation (TCP) is used to revalidate modified software, ensuring its quality before release on the digital market. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
15
Transparent insights into alzheimer’s progression: a time-aware approach with explainable
Published 2024“…This approach not only enhances transparency but also builds trust in the model’s outcomes. The ADNI dataset, comprising 2980 observations, was employed for developing a prediction model using various machine learning classifiers. …”
Get full text
Get full text
Get full text
Article -
16
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
17
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
LTE-based passive radar for ground target detection and tracking
Published 2015Get full text
Get full text
Thesis -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
20
Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia
Published 2020“…The continual development of new construction, road networks and buildings has eradicated UGS areas thus contributing to the rising of land surface temperature (LST). …”
Get full text
Get full text
Thesis
