Search Results - (( developing formative causing algorithm ) OR ( java applications stemming algorithm ))

Refine Results
  1. 1
  2. 2

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm by Zainudin, Azlan

    Published 2018
    “…The combustion of wasted palm oil materials leads to the formation of Palm Oil Fuel Ash (POFA). The lack of use of POFA for beneficial applications causes environmental problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Effect of viscous dampers on yielding mechanisms of RC structures during earthquake by Hejazi, Farzad, Shoaei, Mohammad Dalili, Jaafar, Mohd Saleh

    Published 2015
    “…For this purpose, adapting the Newmark method, a finite element algorithm was developed for the nonlinear dynamic analysis of reinforced concrete buildings equipped with VDs that are subjected to earthquake. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…Also, Most image scrambling algorithms apply one iteration level scrambling that cause a high possibility of occurs the weakness of visual leakage on the image scrambling algorithm which can be reflected by the corresponding scrambled image. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Text normalization algorithm for facebook chats in Hausa language by Jaafar, Zubairu Maitama, Haruna, Usman, Gambo, Abdullahi Ya'u, Thomas, Bimba Andrew, Idris, Norisma, Ya’u Gital, Abdulsalam, Abubakar, Adamu

    Published 2014
    “…This is accomplished through modification of the technique employed by [1] to fit Hausa NSWs' formation. It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Segmenting nodules of lung tomography image with level set algorithm and neural network by Chong, Soon Yee, Tan, Min Keng, Yeo, Kiam Beng, Mohd Yusof Ibrahim, Hao, Xiaoxi, Teo, Kenneth Tze Kin

    Published 2019
    “…The aim of this research is to develop an image segmentation algorithm for nodule detection in computed tomography (CT) image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  9. 9

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  10. 10

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Assessment of proposed lateral resistance system used with framed structures by Fateh, Amir

    Published 2016
    “…The specific finite element algorithms are developed and implemented in the finite element program code for the nonlinear analysis of RC framed buildings. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
    Get full text
    Thesis
  13. 13

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A reliable unicast routing protocol for mobile ad hoc network by Sargolzaey, Hadi

    Published 2013
    “…It is also shown that the algorithm contributed greatly to reducing control overhead and although we have extra control packets overhead due to the cluster formation and maintenance, we see 27% to 38% control packets overhead reduction in different network conditions.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian by Tey, Siew Kian

    Published 2009
    “…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Satellite based quantitative rainfall estimation for flash flood forecasting / Wardah Tahir by Tahir, Wardah

    Published 2008
    “…In this study, a rainfall estimation algorithm using the information from the geostationary meteorological satellite infrared (IR) images is developed for potential input to a flood forecasting system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Inhibition of dengue virus entry into target cells using synthetic antiviral peptides by Alhoot, M.A., Rathinam, A.K., Wang, S.M., Manikam, R., Sekaran, S.D.

    Published 2013
    “…Four putative antiviral peptides were designed to target domain III of DENV-2 E protein using BioMoDroid algorithm. Two peptides showed significant inhibition of DENV when simultaneously incubated as shown by plaque formation assay, RT-qPCR, and Western blot analysis. …”
    Get full text
    Get full text
    Article