Search Results - (( developing formative causing algorithm ) OR ( java applications stemming algorithm ))
Search alternatives:
- applications stemming »
- developing formative »
- stemming algorithm »
- formative causing »
- causing algorithm »
- java applications »
-
1
-
2
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
3
Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm
Published 2018“…The combustion of wasted palm oil materials leads to the formation of Palm Oil Fuel Ash (POFA). The lack of use of POFA for beneficial applications causes environmental problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
5
Effect of viscous dampers on yielding mechanisms of RC structures during earthquake
Published 2015“…For this purpose, adapting the Newmark method, a finite element algorithm was developed for the nonlinear dynamic analysis of reinforced concrete buildings equipped with VDs that are subjected to earthquake. …”
Get full text
Get full text
Get full text
Article -
6
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Also, Most image scrambling algorithms apply one iteration level scrambling that cause a high possibility of occurs the weakness of visual leakage on the image scrambling algorithm which can be reflected by the corresponding scrambled image. …”
Get full text
Get full text
Get full text
Article -
7
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…This is accomplished through modification of the technique employed by [1] to fit Hausa NSWs' formation. It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Segmenting nodules of lung tomography image with level set algorithm and neural network
Published 2019“…The aim of this research is to develop an image segmentation algorithm for nodule detection in computed tomography (CT) image. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
10
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
11
Assessment of proposed lateral resistance system used with framed structures
Published 2016“…The specific finite element algorithms are developed and implemented in the finite element program code for the nonlinear analysis of RC framed buildings. …”
Get full text
Get full text
Thesis -
12
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
Get full text
Thesis -
13
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
14
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
15
A reliable unicast routing protocol for mobile ad hoc network
Published 2013“…It is also shown that the algorithm contributed greatly to reducing control overhead and although we have extra control packets overhead due to the cluster formation and maintenance, we see 27% to 38% control packets overhead reduction in different network conditions.…”
Get full text
Get full text
Thesis -
16
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Satellite based quantitative rainfall estimation for flash flood forecasting / Wardah Tahir
Published 2008“…In this study, a rainfall estimation algorithm using the information from the geostationary meteorological satellite infrared (IR) images is developed for potential input to a flood forecasting system. …”
Get full text
Get full text
Thesis -
18
Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Three state-of-theart contemporary actor-critic algorithms are used to create an extensive simulation in Unity3D. …”
Get full text
Get full text
Get full text
Article -
19
Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Three state-of-the-art contemporary actor-critic algorithms are used to create an extensive simulation in Unity3D. …”
Get full text
Get full text
Get full text
Article -
20
Inhibition of dengue virus entry into target cells using synthetic antiviral peptides
Published 2013“…Four putative antiviral peptides were designed to target domain III of DENV-2 E protein using BioMoDroid algorithm. Two peptides showed significant inhibition of DENV when simultaneously incubated as shown by plaque formation assay, RT-qPCR, and Western blot analysis. …”
Get full text
Get full text
Article
