Search Results - (( developing sigma implementation algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Under voltage load shedding scheme using meta-heuristic optimization methods [Meta-heurystyczne metody optymalizacyjne wykorzystywane do szybkiego pozbywania si? obci??enia sieci] by Verayiah R., Mohamed A., Shareef H., Abidin I.Z.

    Published 2023
    “…This study provides an overview of all the meta-heuristic methods implemented for under voltage load shedding in power systems. © 2014, Wydawnictwo SIGMA - N O T Sp. z o.o. …”
    Article
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A New Optimization Technique Of Support Vector Machine For Electricity Market Price Forecasting by Wan Abdul Razak, Intan Azmira, Zainal Abidin, Izham, Yap, Keem Siah, Sulaima, Mohamad Fani, Hassan, Elia Erwani, Gan, Chin Kim

    Published 2019
    “…Therefore, a hybrid of Least Square Support Vector Machine (LSSVM) and Bacterial Foraging Optimization Algorithms (BFOA) is proposed in this research to provide an accurate price forecast with optimized LSSVM parameters (gamma and sigma) and features. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  5. 5

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis