Search Results - (( initial visualization search algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…The chapter also carries out an analytical review of three main searching algorithms namely, generate and test, uninformed search, and hill climbing search algorithms. …”
    Get full text
    Get full text
    Book
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Hybrid conjugate gradient using exact line search in photovoltaic system / Muhammad Ariiq Iqbaal Azizul Firdaus by Azizul Firdaus, Muhammad Ariiq Iqbaal

    Published 2025
    “…Fifteen test functions with different initial points and variables ranged from 2 to 10,000 variables are chosen. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…The algorithm has the capability of reducing any shortcoming associated with normalisation in initial fusion technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria by Pawar, Shrikant, Bramha Chari, P. V., Lahiri, Chandrajit *

    Published 2019
    “…These quorum-sensing peptides (QSPs) can initiate a signaling cascade of events via two-component system or even by direct binding to transcription factors. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…The entire system is implemented, tested and validated using MATLAB and Visual C++. Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
    Get full text
    Get full text
    Final Year Project