Search Results - (( developing self efficiency algorithm ) OR ( java evaluation method algorithm ))
Search alternatives:
- efficiency algorithm »
- method algorithm »
- developing self »
- self efficiency »
- java evaluation »
-
1
An efficient fault syndromes simulator for SRAM memories
Published 2009“…Universities and industry involved in memory Built- in-Self test, Built-in-Self repair and Built-in-Self diagnose will benefit by saving a few years on researching an efficient algorithm to be implemented in their designs.…”
Get full text
Get full text
Get full text
Article -
2
A fault syndromes simulator for random access memories
Published 2008“…Universities and industry involved in memory Built-in-Self test, Built-in-Self repair and Built-in-Self diagnose will benefit by saving a few years on finding an efficient algorithm to be implemented in their designs.…”
Get full text
Get full text
Article -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Guidance and control for satellite in-orbit-self-assembly proximity operations
Published 2015“…Guidance and control algorithms are developed based on the closed-form analytical solution of relative motion equations that is completely explicit in time in a general Keplerian orbit. …”
Get full text
Get full text
Get full text
Article -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
7
Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches
Published 2024“…Nevertheless, the problem of efficient autonomous robot navigation persists in multiple degrees due to the limitation of these algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Article -
9
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Get full text
Article -
10
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…To achieve this objective, an iterative approach based on swarm intelligence is used to find the optimal CQI threshold at which the competing criteria are optimized. Since the developed downlink scheduler and the partial feedback scheme affect the QoS, self-configured versions of both algorithms are developed to provide QoS provisioning. …”
Get full text
Get full text
Thesis -
11
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks
Published 2013“…First, we review the significant topology control algorithms to provide insights into how energy efficiency is achieved by design. …”
Get full text
Get full text
Citation Index Journal -
13
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…An experimental analysis is conducted by several experiments to evaluate the performance of the proposed ensemble methods which has been tested on the 4 benchmark datasets, namely LingSpam, SpamAssassin, Spambase and CSDMC2010. …”
Get full text
Get full text
Thesis -
14
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. …”
Get full text
Get full text
Thesis -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
18
Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin
Published 2016“…This research scope are to develop a computer application that can extract meaningful information in images by implement KMeans clustering algorithm 10 self capture facial image will be use as the research subject to test the algorithm that will extracting meaningful information of the person. …”
Get full text
Get full text
Thesis -
19
Development of task distribution algorithm for multi-robot coordination system
Published 2022“…Algorithms are integrated with RMF for task distribution and path planning for the robots. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
Get full text
Get full text
Thesis
