Search Results - (( developing general format algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- format algorithm »
- java implication »
- implication tree »
- tree algorithm »
-
1
Coalition formation for throughput enhancement via one-sided matching theory
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
-
3
Optimisation of fed-batch fermentation process using deep reinforcement learning
Published 2023“…In other cases of different initial yeast and substrate concentrations, the proposed algorithm in general outperforms the exponential feeding profile while produces comparable results to the genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
Get full text
Get full text
Thesis -
6
Multi-Agent Reinforcement Learning For Swarm Robots Formation
Published 2021Get full text
Get full text
Monograph -
7
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
8
Guidance and control for satellite in-orbit-self-assembly proximity operations
Published 2015“…Guidance and control algorithms are developed based on the closed-form analytical solution of relative motion equations that is completely explicit in time in a general Keplerian orbit. …”
Get full text
Get full text
Get full text
Article -
9
General Algorithm of n-Multiple Coil Shape for Variable Links Hyper-Redundant Robotic Manipulator
Published 2011“…The flexibility introduced by the multiple coil shape can be further enhanced by having extensible links. In this paper, a general algorithm for n-links hyper-redundant robot manipulator to produce n-multiple coil shape to reach final desired position with variable links is presented. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
13
-
14
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
15
-
16
Autonomous multi satellites assembly in keplerian orbits
Published 2013“…In this paper, the guidance and control algorithms of an autonomous multiple satellite assembly are developed in a general keplerian orbit. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Segmenting nodules of lung tomography image with level set algorithm and neural network
Published 2019“…The aim of this research is to develop an image segmentation algorithm for nodule detection in computed tomography (CT) image. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
18
Lattice-based cryptography: the dots that provide information security
Published 2023Get full text
Get full text
Get full text
Get full text
Proceedings -
19
-
20
