Search Results - (( developing formative key algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…Therefore, uncompressed video format has been used in the research undertaken. On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement by Ab Jabal, Mohamad Faizal, Rozlan, Muhammad Irfan, Suhaimi, Azrina, Hasmy, Harshida

    Published 2025
    “…Key findings reveal deficiencies in current image datasets, leading to a proposed standardised acquisition protocol involving consistent lighting, optimal camera positioning, and suitable file formats. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…Current techniques for managing XML in relational technology consider only the structure of an XML document and ignore its semantics as expressed by keys and functional dependencies. Approach: In this study we present an algorithm for generating an optimal design for XML in relational setting. …”
    Get full text
    Get full text
    Journal
  7. 7

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Video colorization using canny optimization technique / Irwin Kevin Mueson by Irwin Kevin Mueson

    Published 2016
    “…Ramlee movie which is originally in grayscale. Development is time consuming especially on colorization process, and it will be develop using Matlab. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Predicting the maturity and organic richness using artificial neural networks (ANNs): A case study of Montney Formation, NE British Columbia, Canada by Barham, A., Ismail, M.S., Hermana, M., Padmanabhan, E., Baashar, Y., Sabir, O.

    Published 2021
    “…Total Organic Carbon (TOC) and maturity level (Tmax) for any source rock considered to be the key parameters for evaluating its potentiality. …”
    Get full text
    Get full text
    Article
  11. 11

    Performance Analysis of Duty-Cycle Division Multiplexing for Optical Fiber Communication Systems by Mahdiraji, Ghafour Amouzad

    Published 2009
    “…In this study, the design of DCDM multiplexer and demultiplexer is improved. A new set of algorithm are developed for data recovery in the receiver. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, the generated stego signature (s) is used to make stego key (k) based on the zero-distortion approach to represent the secret message (m) in a binary format. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Terrain awareness mobility model to support outdoor mobility for people with vision impairment by Yousef, Malkawi Abeer Dirar

    Published 2023
    “…Accordingly, TAM2 and the terrain detection app represent the key contribution of this study.…”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…The Mean Square Error (MSE) and Peak-Signal-to-Noise Ratio (PSNR) are calculated. The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Geometrical and dimensional defect evaluation of cold forged AA6061 propeller blade by Abdullah, Ahmad Baharuddin

    Published 2013
    “…In this study,defect was considered based on profile deviation, which was obtained from the 3D surface measurement technique. An algorithm was developed to measure the deviation. The result showed that the thickness error depended on the deformation ratio whereas the twist angle accuracy relied on the amount of twist and thickness of the blade. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Characterization of miR-3099-mediated posttranscriptional of target genes regulation during neurogenesis in mice by Zainal Abidin, Shahidee

    Published 2019
    “…Then, predicted target gene of miR-3099 was further analysed by using four different prediction algorithms (miRDB, miRanda, TargetScan and DIANA-micro-T-CDS) and DAVID bioinformatics analysis with emphasis on target genes related to brain development and function. …”
    Get full text
    Get full text
    Thesis