Search Results - (( developing indicator against algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    Urban planning and indicators for sustainability by Abdul Hadi Harman Shah

    Published 2002
    “…The paper then highlights accuracy, reliability and usability components of indicator development that leads to the need for meta-indicators…”
    Get full text
    Get full text
    Article
  2. 2

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Three-dimensional coverage control for multi-unmanned aerial vehicle by Siow, Wen Hao

    Published 2024
    “…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The EBGWO algorithm was evaluated on NSL-KDD and six (6) benchmark datasets from the University California Irvine (UCI) repository against ten (10) benchmark metaheuristic algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A novel hybrid classification model of genetic algorithms, modified k-Nearest Neighbor and developed backpropagation neural network by Salari, Nader, Shohaimi, Shamarina, Najafi, Farid, Nallappan, Meenakshii, Karishnarajah, Isthrinayagy

    Published 2014
    “…The purpose is benefitting from the synergies obtained from combining these technologies for the development of classification models. Such a combination creates an opportunity to invest in the strength of each algorithm, and is an approach to make up for their deficiencies. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of multi-objective optimization methods for integrated scheduling of handling equipment (AGVs, QCs, SP-AS/RS) in automated container terminals by Homayouni, Seyed Mahdi

    Published 2012
    “…Therefore, two meta-heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA) algorithm, were developed to optimize the integrated scheduling of handling equipment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Feature-based stereo vision relative positioning strategy for formation control of unmanned aerial vehicles by Yaghoobi, Yousef, Bahiki, Muhammad Rijaluddin, Syaril Azrad

    Published 2019
    “…In addition, several different techniques and approaches for developing the algorithm is discussed as well. As per system requirements and conducted study, the algorithm that is developed for this Vision System is based on Tracking and On-Line Machine Learning approach. …”
    Get full text
    Get full text
    Article
  8. 8

    MISSING DAILY RAINFALL PREDICTION USING GREY WOLF OPTIMIZER-BASED NEURAL NETWORK by Lai, Wai Yan, Kuok, King Kuok, Chiu, Po Chan, Md. Rezaur, Rahman, Muhammad Khusairy, Bakri

    Published 2024
    “…Comparative analyses were conducted against the Levenberg-Marquardt Feedforward Neural Network (LMFNN) and the K-Nearest Neighbour (KNN) algorithm, both of which are recognized for their reliability in addressing missing rainfall data. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…We also compared its performance against human experts. The results based on 168 summary sentences indicate that the algorithm successfully identified these syntax level strategies: deletion, sentence combination, copy-paste, syntactic transformation and sentence reordering. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cross-reactive neutralizing antibody epitopes against Enterovirus 71 identified by an in silico approach by Kirk, Kristin, Poh, Chit Laa *, Fecondo, John, Pourianfar, Hamid Reza, Shaw, J., Grollo, Lara

    Published 2012
    “…This indicates that the current approach is promising for the development of synthetic peptide-based vaccine candidates against Picornaviridae. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Multi-Reservoir System Optimization Based on Hybrid Gravitational Algorithm to Minimize Water-Supply Deficiencies by Karami, Hojat, Farzin, Saeed, Jahangiri, Aylin, Ehteram, Mohammad, Kisi, Ozgur, El-Shafie, Ahmed

    Published 2019
    “…Against this background, the present study seeks to introduce and test a Hybrid Algorithm (HA) which integrates the Gravitational Search Algorithm (GSA) with the Particle Swarm Optimization Algorithm (PSOA) with the goal of minimizing irrigation deficiencies in a multi-reservoir system. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Advanced data mining techniques for landslide susceptibility mapping by Ibrahim, M.B., Mustaffa, Z., Balogun, A.-L., Hamonangan Harahap, I.S., Ali Khan, M.

    Published 2021
    “…These predicted datasets were used to develop the Landslides Susceptibility Models. A comparative assessment between the two classifiers against the famous traditional learning algorithm, the Support vector machines (SVM), was conducted. …”
    Get full text
    Get full text
    Article
  15. 15

    The pre-process of smart grid algorithm design for network centric air operation during crisis management / Kritsana Sukdee ... [et al]. by Kritsana, Sukdee, Wattanapong, Rakwichian, Watchara, Wongpanyo, Bunyawat, Vichanpol, Chatkaew, Chailuecha

    Published 2016
    “…The HADR mission requirement, the NCO concept, and the five rings model is mainly integrated into the specific design of smart grid development tool. The results of study indicate energy assurance design model that is able to secure the essential of air operational process failures on the significant NCO concept which is improved by Smart Grid.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…In addition, the results indicate better performance than the related works algorithm with respect to all metrics excluding throughput which AntNet is best in routing when the pause time be more than 40 seconds. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Maximum rate resource allocation algorithms with multiuser diversity and QoS support for downlink OFDMA based WiMAX system by Alsahag, Ali Mohammed, Mohd. Ali, Borhanuddin, Noordin, Nor Kamariah, Mohamad, Hafizal

    Published 2016
    “…Both approaches allocate appropriate resources and provide higher data rates for different service types by employing a weighted-rate factor and feedback information delay which are made to be greater than the minimum QoS requirements. Simulation results indicate that both WASA and FDSA achieve significant performance improvements in terms of spectral efficiency, outage probability, and fairness against the conventional OFDMA-TDMA and MAX-SNR algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…Thus, bootstrapping methods known as Diagnostic Bootstrap (Boot-D) and Weighted Bootstrap with RDF (Boot RDF) are also developed to provide resistance bootstrap estimates against block HLPs. …”
    Get full text
    Get full text
    Thesis
  20. 20

    AES S-box modification uses affine matrices exploration for increased S-box strength by Alamsyah, Alamsyah, Setiawan, Abas, Trisnawan Putra, Anggyi, Budiman, Kholiq, Muslim, Much Aziz, Salahudin, Shahrul Nizam, Prasetiyo, Budi

    Published 2025
    “…The internet and technological advancements are rapidly growing in this era, potentially giving rise to new challenges, particularly in data security. One algorithm developed to secure data is the Advanced Encryption Standard (AES). …”
    Get full text
    Get full text
    Get full text
    Article