Search Results - (( developing execution modified algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- developing execution »
- application stemming »
- execution modified »
- stemming algorithm »
- java application »
-
1
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006Get full text
Get full text
Thesis -
2
Dynamic obstacle handling in multi-robot coverage
Published 2024“…This report focuses on developing a multi-robot coverage algorithm with dynamic obstacle handling abilities, known as the Modified Lloyd’s algorithm with Velocity Obstacle (VO). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Block backward differentiation formulas for solving first and second order fuzzy differential equations
Published 2016“…The algorithm of existing BBDF was modified into fuzzy version. …”
Get full text
Get full text
Get full text
Thesis -
4
Greedyzero-based scheduling algorithm to route in optical low stage interconnection networks
Published 2012“…This algorithm has been developed to achieve performance goals in terms of 50% reduction in the number of passes.…”
Get full text
Get full text
Thesis -
5
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
M-Factors Fuzzy Time Series for Forecasting Moving Holiday Electricity Load Demand in Malaysia (S/O 14589)
“…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
Get full text
Get full text
Monograph -
7
-
8
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004Get full text
Get full text
Monograph -
9
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
Published 2009“…The new proposed system is able to embed information in an execution file without change the size of execution file. …”
Get full text
Get full text
Get full text
Article -
10
Weighted subsethood and reasoning based fuzzy time series for moving holiday electricity load demand forecasting
Published 2021“…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
Get full text
Get full text
Get full text
Thesis -
11
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
Get full text
Get full text
Final Year Project -
12
Parallel Diagonally Implicit Runge-Kutta Methods For Solving Ordinary Differential Equations
Published 2009“…Comparisons on numerical results to existing methods show a competitive efficiency when solving small systems of stiff ODEs. A parallel code is developed with the same capability of the modified sequential code to handle stiff ODEs, linear and nonlinear problems. …”
Get full text
Get full text
Thesis -
13
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Extended from the FastZ algorithms, another three new algorithms called the FastRLP, BRLP and FastBRLP algorithms are developed to achieve different performance goals. …”
Get full text
Get full text
Thesis -
14
Power System State Estimation In Large-Scale Networks
Published 2010“…The results show that AR methods managed to accurately predict the data and filter the weigthage factors for the bad measurements. Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
19
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
