Search Results - (( developing formative efficient algorithm ) OR ( java generation learning algorithm ))
Search alternatives:
- developing formative »
- generation learning »
- learning algorithm »
- java generation »
- efficient »
-
1
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…In addition, one of the main challenges has been development of efficient algorithm for solving aforementioned model to find exact feasible optimal solution. …”
Get full text
Get full text
Thesis -
2
BASE: a bacteria foraging algorithm for cell formation with sequence data
Published 2010“…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
Get full text
Get full text
Get full text
Article -
3
Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations
Published 2013“…This paper investigates the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem. In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
Get full text
Get full text
Article -
4
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
5
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…This optimizes data transmission, enhances energy efficiency, and extends network longevity. The ACO algorithm integrates multiple criteria, ensuring routes are short and energy-efficient. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. Features selection process can be considered a problem of global combinatorial optimization in machine learning. …”
Get full text
Get full text
Thesis -
8
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
9
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
10
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
Get full text
Get full text
Thesis -
13
-
14
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Thus, to develop an efficient scheme to generate non fixed iteration in the image scrambling algorithm in order to eliminate the problem of visual leakage. …”
Get full text
Get full text
Get full text
Article -
15
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
16
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…One of the main challenge in the design of the Wireless ATM network resides in the formation of the Wireless MAC protocol, that could handle various services with a considerable QoS and providing efficient utilization of the Wireless Channel. …”
Get full text
Get full text
Thesis -
17
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
Get full text
Get full text
Thesis -
18
Guidance and control for satellite in-orbit-self-assembly proximity operations
Published 2015“…Numerical nonlinear simulations that illustrate the performance and accuracy of the proposed algorithms are performed in a cubic formation assembly.…”
Get full text
Get full text
Get full text
Article -
19
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
20
