Search Results - (( developing future construction algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- construction algorithm »
- application stemming »
- future construction »
- stemming algorithm »
- java application »
-
1
Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz
Published 2017“…There are six steps of genetic algorithm. The prototype is useful to worker in construction calculate the total number of parking spaces in the future.…”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…After generating the future climate parameters, the predicted stream flow by ANN and estimated future evaporation (convert future minimum and maximum temperature generated by LARS-WG into future evaporation by penman formula) are exported to the constructed models to predict the future power generation output. …”
Get full text
Get full text
Get full text
Thesis -
4
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
Get full text
Get full text
Conference or Workshop Item -
5
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009“…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
Get full text
Get full text
Conference or Workshop Item -
6
Supplier selection for contractors using Fuzzy TOPSIS Algorithm / Mohamed Shafiq Mohamed Yusof
Published 2020“…Fuzzy TOPSIS has been proven to be one of the best methods in decision making and ranking as it has been widely used in many fields (Kacprzak, 2018). The future work of this project is to develop a system by using the same domain but with different algorithm and compare the result with the current result obtained from the system…”
Get full text
Get full text
Thesis -
7
-
8
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…To investigate and capture the development of the pandemic, mapper algorithm can be used to visualize and analyse the COVID data set provided by the government. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Agreement options for negotiation on material location decision of housing development
Published 2020“…It will need the development of trade-off algorithms to analyze value of technical solution in real time. …”
Get full text
Get full text
Article -
10
Adapting robot kinematics for human-arm motion recognition
Published 2007“…This paper presents a novel method to the analysis of human-arm motion, in particular improving the efficiency of conventional motion recognition algorithms. Contrary to the prior art methods, this research develops a framework for human-arm motion recognition where qualitative normalised templates (QNTs) is proposed to replace the conventional approaches. …”
Get full text
Get full text
Article -
11
An Orchestrated Survey on T-Way Test Case Generation Strategies Based on Optimization Algorithms
Published 2014“…Due to the market needed for diverse types of tests, recently, several number of t-way testing strategies (where t indicates the interaction strengths) have been developed adopting different approaches Algebraic, Pure computational, and Optimization Algorithms (OpA). …”
Get full text
Get full text
Get full text
Book Chapter -
12
-
13
-
14
-
15
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This project is developed by using Waterfall Model methodology as it’s the most direct model that is suitable for developing a system which consist of 5 phases which are Requirement Analysis, Design, Implementation, Testing and Maintenance. …”
Get full text
Get full text
Thesis -
16
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…For future work, the algorithm will be extended to identify the semantic level strategies, diagnose the strategies used and provide constructive feedback.…”
Get full text
Get full text
Get full text
Article -
17
A comparative study of clonal selection algorithm for effluent removal forecasting in septic sludge treatment plant
Published 2015“…The development of effluent removal prediction is crucial in providing a planning tool necessary for the future development and the construction of a septic sludge treatment plant (SSTP), especially in the developing countries. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun
Published 2025“…This would really give the opportunity to understand customer feedback clearly, along with faster problems fixation, resulting in an enhanced service quality being developed. This technique in the near future can further be enhanced through complex algorithms by applying it on bigger datasets also, which creates the platform for enhancement in customers' satisfaction and makes airlines smarter too.…”
Get full text
Get full text
Thesis -
19
Building a feature-space for visual surveillance
Published 2014“…Visual surveillance applications play essential roles as a tool for archiving and to some extend preventing criminal activities. The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article
