Search Results - (( development background optimization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- development background »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
Get full text
Get full text
Get full text
Article -
3
Multi-Reservoir System Optimization Based on Hybrid Gravitational Algorithm to Minimize Water-Supply Deficiencies
Published 2019“…Several methods based on algorithms have been developed in recent years in a bid to optimize water release operation policy, in order to overcome or minimize the impact of droughts. …”
Get full text
Get full text
Article -
4
-
5
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
8
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…We have developed Metaheuristic algorithms includes the Genetic Algorithm (GA) and Ant Colony Optimization Algorithm (ACO), to solve the proposed model. …”
Get full text
Get full text
Article -
9
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
11
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
12
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Clustering problem is discussed as a problem of non-smooth, non-convex optimization and a new method for solving this optimization problem is developed. …”
Get full text
Get full text
Thesis -
13
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The MGT algorithm is useful to explore the properties of the Pareto-optimal offers. …”
Get full text
Get full text
Thesis -
14
Personalized administration of contrast medium with high delivery rate in low tube voltage coronary computed tomography angiography
Published 2019“…Background: High delivery rate is an important factor in optimizing contrast medium administration in coronary computed tomography angiography (CCTA). …”
Get full text
Get full text
Article -
15
-
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Adaptive path finding algorithm in dynamic environment for warehouse robot
Published 2020“…One of the fundamental components when designing a warehouse robot is path finding algorithm. In the past, many path finding algorithms had been proposed to identify the optimal path and improve the efficiency in different conditions. …”
Get full text
Get full text
Get full text
Article -
18
Segmentation of pulmonary cavity in lung CT scan for tuberculosis disease
Published 2024“…The algorithm, first, calculates the optimal threshold for separating the lesion from the background region. …”
Get full text
Get full text
Get full text
Article -
19
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…In this background, the current study develops Intelligent Multiverse Optimization with Deep Learning Enabled Intrusion Detection System (IMVO-DLIDS) for IoT environment. …”
Get full text
Get full text
Get full text
Article -
20
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis
