Search Results - (( developing sigma implementation algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- implementation algorithm »
- customization algorithm »
- sigma implementation »
- developing sigma »
- java application »
-
1
Under voltage load shedding scheme using meta-heuristic optimization methods [Meta-heurystyczne metody optymalizacyjne wykorzystywane do szybkiego pozbywania si? obci??enia sieci]
Published 2023“…This study provides an overview of all the meta-heuristic methods implemented for under voltage load shedding in power systems. © 2014, Wydawnictwo SIGMA - N O T Sp. z o.o. …”
Article -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A New Optimization Technique Of Support Vector Machine For Electricity Market Price Forecasting
Published 2019“…Therefore, a hybrid of Least Square Support Vector Machine (LSSVM) and Bacterial Foraging Optimization Algorithms (BFOA) is proposed in this research to provide an accurate price forecast with optimized LSSVM parameters (gamma and sigma) and features. …”
Get full text
Get full text
Get full text
Technical Report -
5
Zero distortion-based steganography for handwritten signature
Published 2018“…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis
