Search Results - (( developing prevention program algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing prevention »
- implication based »
- java implication »
-
1
-
2
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Developing a predictive model for forest fires occurrence is an important activity in a fire prevention program. …”
Get full text
Get full text
Get full text
Article -
3
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…It is also found that using appropriate preventive maintenance program can cause up to 75% reduction in cell-load variation. …”
Get full text
Get full text
Thesis -
4
Implementation of Dijkstra Algorithm with React Native to Determine Covid-19 Distribution
Published 2022“…This research implements Dijkstra's Algorithm written in the React Native programming language to build a Covid-19 tracking application. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Divorce prediction using Naive Bayes / Alia Hannani Ahmad Bakri
Published 2024Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
8
Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin
Published 2008“…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
Get full text
Get full text
Thesis -
9
Energy Management System For Controlling Series Hybrid Electric Motorcycle
Published 2016“…Tuning and adaptation of the control algorithm had been demonstrated so developers can make use of them for their applications. …”
Get full text
Get full text
Thesis -
10
Development of a sensor device algorithm and monitoring system for the pin-on-disc (POD) tribometer
Published 2024text::Final Year Project -
11
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
Get full text
Get full text
Thesis -
14
Botnet detection using automated script / Norfathin Rosli
Published 2020“…The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. …”
Get full text
Get full text
Thesis -
15
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
16
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Nevertheless, the optimization task requires specific care in order to prevent the issue of overfitting classification model. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
text::Thesis -
19
Encryption Technology on Windows Workstation
Published 2004“…In addition, the objective is to tighten the security of Windows platform by implementing a new way of encrypting users' information to prevent access by unauthorized users. This is achieved by trying to combine several techniques of securing and strengthening the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
20
Hybrid fuzzy-sliding mode observer design for estimation and advanced control of an ethylene polymerization process / Jarinah Mohd Ali
Published 2017“…It is always important to determine those unknown variables before developing state feedback laws for control, preventing process disruptions and plant shutdowns. …”
Get full text
Get full text
Get full text
Thesis
