Search Results - (( developing small selection algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- selection algorithm »
- developing small »
- validation using »
- small selection »
- java validation »
- using algorithm »
-
1
-
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
6
Aco-based feature selection algorithm for classification
Published 2022“…The modified graph clustering ant colony optimisation (MGCACO) algorithm is an effective FS method that was developed based on grouping the highly correlated features. …”
Get full text
Get full text
Thesis -
7
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Evaluation of FCV and FCM clustering algorithms in cluster-based compound selection
Published 2011“…One of most used clustering method is cluster-based compound selection, which involves subdividing a set of compounds into clusters and choosing one compound or a small number of compounds from each cluster. …”
Get full text
Get full text
Get full text
Article -
9
A model for gene selection and classification of gene expression data
Published 2007“…A model for gene selection and classification has been developed by using a filter approach, and an improved hybrid of the genetic algorithm and a support vector machine classifier. …”
Get full text
Get full text
Get full text
Article -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
11
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…In conclusion, SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics can be used as models selection algorithms. Additionally, both algorithms are suitable in improving performance of automated models selection procedures. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Swarm intelligence-based feature selection for amphetamine-type stimulants (ATS) drug 3D molecular structure classification
Published 2021“…For this purpose, the binary version of swarm algorithms facilitated with the S-shaped or sigmoid transfer function known as binary whale optimization algorithm (BWOA), binary particle swarm optimiza-tion algorithm (BPSO), and new binary manta-ray foraging opti-mization algorithm (BMRFO) are developed for feature selection. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
14
LASSO-type estimations for threshold autoregressive and heteroscedastic time series models.
Published 2020“…In this thesis, we propose Least Absolute Shrinkage and Selection Operator (LASSO) type estimators to perform simultaneous parameter estimation and model selection for five specific univariate and multivariate time series models, and develop several algorithms to compute these estimators. …”
Get full text
Get full text
UMK Etheses -
15
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
16
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
Published 2018“…Material and methods: To test the proposed technique, selected approximation algorithms have been developed to small graph instances. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Application of fuzzy clustering analysis to compound datasets for drug lead identification
Published 2012“…One of most used compound selection method is clusterbased compound selection, which involves subdividing a set of compounds into clusters and choosing one compound or a small number of compounds from each cluster. …”
Get full text
Get full text
Get full text
Proceeding -
18
Numerical analysis
Published 2008“…In the numerical solution of differential equations, where the numerical approximation is developed in small time-steps, there are typically three challenges. …”
Get full text
Get full text
Get full text
Article -
19
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
Article -
20
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
