Search Results - (( developing technical evolution algorithm ) OR ( java identification based algorithm ))
Search alternatives:
- developing technical »
- identification based »
- technical evolution »
- evolution algorithm »
- java identification »
-
1
Navigating challenges and opportunities of machine learning in hydrogen catalysis and production processes: Beyond algorithm development
Published 2025“…Hence, this comprehensive review delves into the technical, practical, and ethical considerations associated with the application of ML in HER catalyst development and HPP optimization. …”
Review -
2
-
3
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The result shows that the performance of FRA correlates strongly to PQF model with 98% correlation compared to the Kolmogorov-Smirnov Correlation Based Filter (KSCBF) algorithm with 83% correlation. …”
Get full text
Get full text
Get full text
Thesis -
4
Fingerprint frontier: the evolution of biometric security
Published 2023“…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
Get full text
Get full text
Get full text
Book -
5
Design and development of portable real-time temperature monitoring and control system
Published 2010Get full text
Working Paper -
6
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…In conclusion, the recommended knowledge network created based on the automatic interest identification has now become medium for users to refer for knowledge sources and later perform knowledge sharing tasks.…”
Get full text
Get full text
Thesis -
7
-
8
-
9
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks
Published 2017“…Strategies to acquire white space information is the single most significant functionality in cognitive radio networks (CRNs) and as such, it has gone some evolution to enhance information accuracy. The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
Get full text
Get full text
Get full text
Article -
11
Performance analysis of hybrid renewable energy systems used for rural electrification in Malaysia / Laith Mahmoud Mohammad Halabi
Published 2017“…The analysis examined the performance based on technical, economic and environmental aspects. Furthermore, the development of solar radiation prediction algorithms in addition to integrating a flexible hybrid renewable energy design are presented. …”
Get full text
Get full text
Thesis -
12
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Techno-economic evaluation of off-grid hybrid renewable energy system for rural resort electrification in Malaysia / Monowar Hossain
Published 2017“…For these purposes, the standalone ANFIS, ANFIS-PSO (particle swarm optimization),ANFIS-GA (genetic algorithm) and ANFIS-DE (differential evolution) prediction algorithms have been developed in MATLAB platform. …”
Get full text
Get full text
Thesis -
14
-
15
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
