Search Results - (( developing formative indication algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- developing formative »
- indication algorithm »
- java implication »
-
1
Feature-based stereo vision relative positioning strategy for formation control of unmanned aerial vehicles
Published 2019“…In addition, several different techniques and approaches for developing the algorithm is discussed as well. As per system requirements and conducted study, the algorithm that is developed for this Vision System is based on Tracking and On-Line Machine Learning approach. …”
Get full text
Get full text
Article -
2
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis -
3
Multi-Agent Reinforcement Learning For Swarm Robots Formation
Published 2021Get full text
Get full text
Monograph -
4
A Comparative Study of Some Cellular Manufacturing Techniques
Published 2000“…Overall, Bond Energy Algorithm (BEA) was found to be the best cell formation technique.…”
Get full text
Get full text
Article -
5
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
Get full text
Get full text
Thesis -
6
Development of an integrated model for production planning and cell formation in cellular manufacturing systems
Published 2010“…However, only a few studies explicitly and simultaneously incorporate the CMS context, production planning and cell formation problem. In this thesis, a mathematical programming model is developed using an integrated approach for production planning and CF problems in a CMS. …”
Get full text
Get full text
Thesis -
7
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…The proposed intelligent algorithms would rely on the population intelligent search (PIS) techniques considered as viable replacement for the MCS method in assessing the reliability indices of non-chronological system. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
Get full text
Get full text
Get full text
Article -
10
Analysis of daytime and nighttime ground level ozone concentrations using boosted regression tree technique
Published 2017“…Results showed that the model developed was within the acceptable range and could be used to understand ozone formation and identify potential sources of ozone for estimating O3 concentrations during daytime and nighttime Results indicated that the wind speed, wind direction, relative humidity, and temperature were the most dominant variables in terms of influencing ozone formation. …”
Get full text
Get full text
Get full text
Article -
11
Estimation of small-scale kinetic parameters of escherichia coli (E. coli) model by enhanced segment particle swarm optimization algorithm ese-pso
Published 2023“…In this regard, the result of the ESe-PSO algorithm achieved superior accuracy compared with the Segment Particle Swarm Optimization (Se-PSO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Differential Evolution (DE) algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
13
Estimating the optimal threshold value for foreign investment in Malaysia / Noorzahirah Mohd Sidek and Mahadzir Ismail
Published 2012“…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries. …”
Get full text
Get full text
Research Reports -
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…The higher speed up factor in TALLOR indicated that the performance of the proposed multi-frames watermarking scheme is affected by the algorithm complexity of the adopted watermarking scheme and the number of frames in medical images processed.…”
Get full text
Get full text
Thesis -
16
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
17
Diagnosis of voice disorders using band energy spectrum in wavelet domain
Published 2011Get full text
Working Paper -
18
Investment, trade and exchange rates / Noor Zahirah Mohd Sidek and Mahadzir Ismail
Published 2012“…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries.…”
Get full text
Get full text
Research Reports -
19
Face Detection System / Chan Beh Teng
Published 2004“…Before the detection process begins, the system pre-processes the image into a format required by the system. The system will generate an output where every detected face will be indicated with a rectangle on a copy of the original image. …”
Get full text
Get full text
Thesis -
20
Optimal sizing of autonomous hybrid microgrids with economic analysis using grey wolf optimizer technique
Published 2023“…These formations are subjected to two energy management strategies: load following (LFs) and cyclic charging (CCs). …”
Get full text
Get full text
Get full text
Article
