Search Results - (( developing visit control algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- developing visit »
- java implication »
- visit control »
-
1
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
2
Autonomous reconnaissance mission: development of an algorithm for collaborative multi robot communication
Published 2010Get full text
Get full text
Proceeding Paper -
3
-
4
Cohesive token passing algorithm utilizing software agents
Published 2010“…A complete circulation of the ring is defined upon all nodes being visited at least once. Discrete-event simulation models were developed and deployed for the purpose of performance analysis. …”
Get full text
Get full text
Article -
5
Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim
Published 2019“…The DSIRP is modeled as stochastic dynamic programming and solved using a matheuristic, enhanced hybrid rollout algorithm. The enhanced algorithm embeds additional controls generated using ABC. …”
Get full text
Get full text
Get full text
Thesis -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images
Published 2015“…The generated control points are refined by using the sum of absolute difference algorithm (SAD), with the help of an empirical threshold and control point locations to avoid obtaining inaccurate control points. …”
Get full text
Get full text
Thesis -
9
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
Get full text
Get full text
Thesis
