Search Results - (( development perspective modified algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael by Zaidan, A.A., Zaidan, B.B., Al-Frajat, Ali K., Jalab, Hamid Abdullah

    Published 2010
    “…It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. …”
    Get full text
    Get full text
    Article
  5. 5

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A Novel Hybrid Deep Learning Model Based on Simulated Annealing and Cuckoo Search Algorithms for Automatic Radiomics-Based COVID-19 Diagnosis by Saleh, Basma Jumaa, Omar, Zaid, As’ari, Muhammad Amir, Bhateja, Vikrant, Izhar, Lila Iznita

    Published 2025
    “…To address this, we propose an efficient, modified radiomics feature processing method that integrates an optimal aerial perspective (OAP) parameter-based intensity dark channel prior (IDCP) with a 50-layer residual deep neural network (ResNet50 DNN) for autolesion segmentation (ALS-IOAP-DNN). …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…However, the employability of these algorithms depends on the desired application and its requirements. …”
    Get full text
    Get full text
    Thesis