Search Results - (( developing formative modified algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1
  2. 2

    BASE: a bacteria foraging algorithm for cell formation with sequence data by Nouri, Hossein, Tang, Sai Hong, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2010
    “…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Multi-Object Attitude and Rate Tracking for Spacecraft in Formation Flying by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…Based on the same approach the relative dynamics and kinematics are augmented to the previous system to represent the overall system process model. The developed controller is applied to spacecraft in formation as a decentralized control algorithm which aims to track absolute and relative attitude and rates simultaneously.The developed controller is applied to a spacecraft formation in a remote sensing mission.The simulations results show the capabilities of the MSDRE to handle the multi-object tracking without any unnecessary control efforts that might lead to actuators saturations or additional control logic to switch between absolute and relative tracking. …”
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Guidance and control for satellite in-orbit-self-assembly proximity operations by Okasha, Mohamed Elsayed Aly Abd Elaziz, Park, Chandeok, Park, Sang-Young

    Published 2015
    “…Numerical nonlinear simulations that illustrate the performance and accuracy of the proposed algorithms are performed in a cubic formation assembly.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A modified strength capacity for composite slab using reliability approach by Mohammed, Kachalla

    Published 2016
    “…Hence, variable deection, _defl and shear resistance, _prop factors are introduced to modify the existing limit state. Similarly, a procedural algorithm lead to the development of pro_led composite slab strength determination function for both longitudinal shear estimation methods by considering section slenderness and deck characteristics. …”
    Get full text
    Get full text
    Thesis
  10. 10

    New Contrast Enhancement Technique For Non-Uniform Illumination Digital Colour Medical Images by Eng , Sheh Ling

    Published 2016
    “…Firstly, this proposed algorithm tackles the non-uniform illumination issue by implementing two modified Gaussian fuzzy membership functions to predetermined underexposed and overexposed regions. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Fuzzy adaptive emperor penguin optimizer for global optimization problems by Md Abdul, Kader

    Published 2023
    “…The Emperor Penguin Optimizer (EPO) is a recently developed population-based metaheuristic algorithm that simulates the huddling behaviour of emperor penguins. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Video colorization using canny optimization technique / Irwin Kevin Mueson by Irwin Kevin Mueson

    Published 2016
    “…This is a hybrid technique from Colorization using Optimization, which was modified and improved the algorithms by adding Canny Edge Detection to improve the colorization process on the grayscale image or frames. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina by Dele-Afolabi, T.T., Jung, D.W., Ahmadipour, Masoud, Azmah Hanim, M.A., Adeleke, A.O., Kandasamy, M., Gunnasegaran, Prem

    Published 2024
    “…This study demonstrates the mass loss of monolithic and Ni-reinforced porous alumina developed using rice husk and sugarcane bagasse in acidic and alkaline corrosive media. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An experimental study of a fuzzy adaptive emperor penguin optimizer for global optimization problem by Kader, Md. Abdul, Zamli, Kamal Z., Alkazemi, Basem Yousef

    Published 2022
    “…Emperor Penguin Optimizer (EPO) is a recently developed population-based meta-heuristic algorithm that simulates the huddling behavior of emperor penguins. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Jaya algorithm hybridized with extreme gradient boosting to predict the corrosion-induced mass loss of agro-waste based monolithic and Ni-reinforced porous alumina by Dele-Afolabi T.T., Jung D.W., Ahmadipour M., Azmah Hanim M.A., Adeleke A.O., Kandasamy M., Gunnasegaran P.

    Published 2025
    “…This study demonstrates the mass loss of monolithic and Ni-reinforced porous alumina developed using rice husk and sugarcane bagasse in acidic and alkaline corrosive media. …”
    Article