Search Results - (( developing validating site algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…The proposed method demonstrated a 69.01 % alignment when validated against the weighted sum method. Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Advanced data mining techniques for landslide susceptibility mapping by Ibrahim, M.B., Mustaffa, Z., Balogun, A.-L., Hamonangan Harahap, I.S., Ali Khan, M.

    Published 2021
    “…Simultaneously, the traditional algorithm is also useful and remains relevant, especially with similar site conditions. …”
    Get full text
    Get full text
    Article
  5. 5

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The locations of landslides were detected accurately by employing two Machine learning classifiers, namely, SVM and RF, decision rule and hierarchal rules sets were developed by applying decision tree (DT) algorithm to provide improved landslide inventory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…(SESB) to reduce their distribution loss, estimated around 15% at present in Sabah State, Malaysia. The hybrid algorithm is able to preselect customers to be inspected on-site for abnormalities or potential fraud according to their consumption patterns. …”
    Conference Paper
  8. 8

    Construction Noise Prediction Using Stochastic Deep Learning by Ooi, Wei Chien

    Published 2022
    “…The adverse impacts arising from construction noise may jeopardize public welfare, particularly for those who live nearby the construction site. Therefore, this research aims to develop a reliable noise prediction model on the basis of stochastic modelling and deep learning technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The rapid development of Internet increases the writers of blog sites. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Outdoor User Location over 802.11 Ad-hoc Network by Roslan, Mohd Azrik

    Published 2006
    “…At the end of this work, the site testing has validated that this algorithm can be used to determine the user location in outdoor environment with considerable accuracy.…”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing by Hamedianfar, Alireza

    Published 2015
    “…In the first case, the rule sets were manually developed from the first study site and then transferred to the second study site, which had a wider coverage. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of bi-objective optimization model for supply chain network design using data envelopment analysis by Rahimi, Iman

    Published 2017
    “…Several examples have been applied to verify and validate the effectiveness of proposed model and Benders decomposition algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…It is very crucial to have a precise suitability mapping workflow for new landfill sites in the development planning of municipal solid waste management systems. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Introducing a design procedure for Archimedes Screw Turbine based on optimization algorithm by Kazem, Shahverdi, Gholamhassan, Najafi, Rizalman, Mamat, Mohd Fairusham, Ghazali, A.S., EI-Shafy, Mohamed, Mousa

    Published 2023
    “…Then, the grey wolves optimization algorithm was developed to be used as an actual engineering application, sensitively analyzed, and coupled with the prediction model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…After defining homogeneous region in the study area, flood models were developed. A total of 24 sites which were eligible in terms of adequate rainfall and runoff observed data were selected in this region. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Molecular docking studies of Pyranose-2-oxidase from trametes multicolor by Noorbatcha, Ibrahim Ali, Nuge, Tamrin, Yusof, Amirulakmal, Othman, Raihan, Mohd. Salleh, Hamzah

    Published 2013
    “…Lamarckian genetic algorithm (LGA) is used to search for active sites and potential mean force (PMF) scoring method is used to evaluate different binding sites. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper