Search Results - (( developing implementation perspective algorithm ) OR ( java application during algorithm ))
Search alternatives:
- developing implementation »
- application during »
- java application »
- during algorithm »
-
1
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
Get full text
Get full text
Thesis -
2
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
3
Traffic management algorithms for LEO satellite networks
Published 2016“…Overall, from all the three experiments that have been conducted, the proposed routing algorithms which have been developed to manage the network traffic have proved better than the previously developed algorithms in several perspectives especially for the implementation of real-time applications in LEO satellite networks.…”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Agents for Fuzzy Indices of Reliability Power System with Uncertainty Using Monte Carlo Algorithm
Published 2014“…The standard deviation of load level uncertainty in power system reliability assessment has a different value for each load level leading to complexity iterations required in the convergence of Monte Carlo algorithm. In this present work, the fuzzy system agent perspective would be used to control such convergence. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
8
An interactive C++ programming courseware (SIFOO) / Mazliana Hasnan … [et al.]
Published 2012Get full text
Get full text
Book Section -
9
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Stereo Vision Tracking System
Published 2009“…In this work, an initial development study and implementation of stereo vision tracking system was done. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
Bahasa Melayu Stemmer / Subbu Valliappan
Published 2004“…Each of the chapter presents an explanation of the system in a different perspective as to enhance one's understanding of this stemmer.The main idea of this project is to build stemmer that can stem any given words, and to develop a standard stemming algorithm in Malay Language. …”
Get full text
Get full text
Thesis -
16
Sub-route reversal repair mechanism and differential evolution for urban transit network design problem
Published 2017“…All proposed algorithms are executed using Python programming language, and the computational results show that the proposed algorithms improve the best-so-far results from the literature in most cases.…”
Get full text
Get full text
Thesis -
17
Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants
Published 2023“…The research elaborates on the design and implementation of machine learning models based on three algorithms: Decision Tree, Gradient Boosted Tree, and Support Vector Machine. …”
Get full text
Get full text
Article -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
19
-
20
An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael
Published 2010“…This overview for advance encryption standard achieving a flexibility and uncomplicated handle with this algorithm, which is a challenge of researchers when be used as implementation. © 2010 Asian Network for Scientific Information.…”
Get full text
Get full text
Article
