Search Results - (( developing formative selection algorithm ) OR ( java application during algorithm ))
Search alternatives:
- developing formative »
- formative selection »
- selection algorithm »
- application during »
- java application »
- during algorithm »
-
1
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…The system is organized into two combined components: weight calculation for each player to estimate their strength and simulation for suitable formation when facing opponents. Then, the system will select the appropriate players to be placed in the specified formation. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm
Published 2013“…With the optimal parameter sets, an operator can select a suitable combination of variables to obtain a better surface finish or lower burr formation. …”
Get full text
Get full text
Thesis -
5
Agreement options for negotiation on material location decision of housing development
Published 2020“…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
6
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…It evaluates system formation methods, hierarchical structures, and leader selection criteria, comparing various parameters to identify factors influencing node formation and routing. …”
Get full text
Get full text
Get full text
Thesis -
7
Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm
Published 2018“…Primarily, this research is about the optimization of triaxial ceramic employing the POFA process by the Taguchi design and Flower Pollination Algorithm (FPA). The recycled POFA was evaluated through the POFA layer formation method where selected POFA layers were employed as filler raw material. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
9
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
10
An enhanced feature selection technique for classification of group-based holy quran verses
Published 2018“…In the experiment, six feature selection algorithms were applied: In.formation Gain (JG), Chi-square (CH), Pearson Correlation Coefficient (PCC), RelieJF, Correlation-based (CFS), and the proposed JG-CFS algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
Get full text
Get full text
Thesis -
13
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
14
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…An enhanced Bucket Brigade Algorithm (BBA) is developed to avoid the problem of choosing classifiers with high strength value but with incorrect behaviour. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
