Search Results - (( developing building method algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- method algorithm »
- during algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip
Published 2017“…In this project, an algorithm is proposed and developed to build the global CDN that is used to distribute the clocks to all partitions in the SoC using the channels available between partitions. …”
Get full text
Get full text
Thesis -
4
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
5
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…Efficient methods of calculating custom weighting factors for load estimation using the transfer function method are also developed. …”
Get full text
Get full text
Thesis -
8
Simulation method of shortest and safest path algorithm for evacuation in high rise building
Published 2014“…The objectives of this research are to identify the suitable shortest and safest path algorithm for evacuation, and followed by design and develop an evacuation preparedness model simulation via shortest path algorithm to choose a suitable exit route to evacuate the evacuees. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021“…In addition, time and expertise are important factors needed to adapt the model to a specific problem such as green building housing development. Green building is known as a potential method to improve building performance efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
10
Strategies for effective value management practice in construction industry
Published 2017“…The investigated VM methods involved conducting building value analysis in the design stage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…The general objective of this study is to carry out a Risk Assessment for Safety and Health (RASH) algorithm for building construction in Oman and to develop a calculation methodology to evaluate safety and health. …”
Get full text
Get full text
Thesis -
13
Development of a new method of crack modeling and prediction algorithm
Published 2008Get full text
Get full text
Proceeding Paper -
14
-
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Developing triad design algorithms based on compatible factorization
Published 2011“…These processes have helped us develop algorithm for triad design, the objective of this study.A new technique for triad design algorithm, known as Interval Generation Method was employed to construct TD(6n + 1) and TD(6n + 5).This method depends on analyzing the pattern of triples in the design to build starters.We begin by producing starters from Interval Generation Method as the initial block to begin with.Then the algorithm begins by cycling modular v from the initial block and finishes when the process approaches the initial block.The algorithms for TD(6n+1) and TD(6n+5) are presented in Chapter 4 and 5, respectively.As the entire study depends mainly on TD(v) algorithms, new and remarkable theorems and lemmas for TD(v) development are presented and proved.…”
Get full text
Get full text
Get full text
Monograph -
17
Building an Algorithm for Measuring C Programming Assignments Quality
Published 2008Get full text
Get full text
Final Year Project -
18
A Distributed Topology Control Method for Improving Energy Efficiency of Wireless Sensor Networks
Published 2012“…By using the TPSI algorithm, our method can build the virtual backbone in a fully distributed manner using localized information. …”
Get full text
Get full text
Conference or Workshop Item -
19
Generalized Triad Design Algorithms
Published 2012“…Previous studies on TD(v) reported its existence when v≡1 or 5 (mod 6) and TD(7) was developed by using a brute-force method. In this study, generalized and new algorithms for developing TD(v) for any v = 6n + 1 or v = 6n + 5 were developed. …”
Get full text
Get full text
Thesis -
20
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis
