Search Results - (( integer _ detection algorithm ) OR ( java adaptation optimization algorithm ))

Search alternatives:

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2
  3. 3

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'Aini

    Published 2007
    “…The modular technique is employed to minimize the complexity involved in such computations. A divisor test algorithm that enables the detection of an unlucky reduction is a crucial device for an effective implementation of the modular technique. …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Development of symbolic algorithms for certain algebraic processes by Abd. Rahman, Ali, Aris, Nor'aini

    Published 2007
    “…The modular technique is employed to minimize the complexity involved in such computations. A divisor test algorithm that enables the detection of an unlucky reduction is a crucial device for an effective implementation of the modular technique. …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Dual-purpose semi-fragile watermark: Authentication and recovery of digital images by Ullah, Rafi, Khan, Asifullah, Malik, Aamir Saeed

    Published 2013
    “…The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In addition, integer wavelet transform has been used to reduce the computational complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  6. 6

    Dual-purpose semi-fragile watermark: Authentication and recovery of digital images by Ullah, R., Khan, A., Malik, A.S.

    Published 2013
    “…The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In: addition, in:teger wavelet transform has been used to reduce the computational complexity of the algorithm. …”
    Get full text
    Get full text
    Article
  7. 7

    A fuzzy multi-objective optimisation model of risk-based gas detector placement methodology for explosion protection in oil and gas facilities by Idris, A.M., Rusli, R., Nasif, M.S., Ramli, A.F., Lim, J.S.

    Published 2022
    “…A flammable gas detection system is one of the critical control strategies of catastrophic events such as fire and explosion. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan by Nauman , Khan

    Published 2024
    “…It is framed as a mixed-integer linear programming problem. To address this complexity, this work presents a multi-objective heuristic algorithm in the framework with the help of other module inputs that efficiently determines the best path for upcoming affected flows and timely isolates the maintenance switch except for the critical switch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Identification of debris flow initiation zones using topographic model and airborne laser scanning data by Lay, Usman Salihu, Pradhan, Biswajeet

    Published 2017
    “…Debris flows and no-debris flows were categorized, and the transform to continuous integer (1 and 0), respectively. To achieve this, the data set was divided into two, 70% (840) for the training dataset and 30% (360) for validation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item