Search Results - (( developing interaction modified algorithm ) OR ( java application means algorithm ))

Refine Results
  1. 1

    A variable combinatorial test suite strategy based on modified greedy algorithm by Homaid, Ameen A. Ba, Alsewari, Abdulrahman A.

    Published 2015
    “…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Whale optimization algorithm strategies for higher interaction strength t-way testing by Ali Abdullah, Hassan, Salwani, Abdullah, Kamal Z., Zamli, Rozilawati, Razali

    Published 2022
    “…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Modeling the properties of terminal blend crumb rubber modified bitumen with crosslinking additives by Jegatheesan N., Ibrahim M.R., Ahmed A.N., Koting S., El-Shafie A., Katman H.Y.B.

    Published 2025
    “…This study aimed to develop models assessing 26 machine-learning algorithms in regression analysis to predict the properties of terminal blend crumb rubber-modified bitumen (TB-CRMB) made with crosslinking additives. …”
    Article
  4. 4

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  8. 8
  9. 9

    Interactive design psychology and artificial intelligence-based innovative exploration of Anglo-American traumatic narrative literature by Hou, Xia, Omar, Noritah, Wang, Jue

    Published 2022
    “…Finally, AI technology and ID psychology are used to modify a famous TN work respectively and synergically, and the modified work is appreciated by respondents to collect their comments. …”
    Get full text
    Get full text
    Article
  10. 10

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system by Retas, Zain

    Published 2023
    “…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD by MOHAMED OSMAN, MOHAMED ABDELRAHIM

    Published 2017
    “…In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    A study on the efficiency of the object model for a dynamic feedback mechanism in network simulator 2 (NS-2) / Nor Adora Endut, Rozianawaty Osman and Noorazida Mohd Idris by Endut, Nor Adora, Osman, Rozianawaty, Mohd Idris, Noorazida

    Published 2008
    “…This project is focused on proposing the utilization of CORBA to develop a middleware having the dynamic interaction mechanism for NS-2. …”
    Get full text
    Get full text
    Research Reports
  19. 19

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Fast marching method and modified features fusion in enhanced dynamic hand gesture segmentation and detection method under complicated background by Khalid, Eman Thabet, Khalid, Fatimah, Sulaiman, Puteri Suhaiza, Yaakob, Razali

    Published 2018
    “…Recent development in the field of human–computer interaction has led renewed interest in dynamic hand gesture segmentation based on gesture recognition system. …”
    Get full text
    Get full text
    Get full text
    Article