Search Results - (( java application customization algorithm ) OR ( using active based algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- using active »
- active based »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…In this study, Particle Swarm Optimization (PSO) based clustering algorithm is exploited to optimize the results of other clustering algorithm such as K-means. …”
Get full text
Get full text
Get full text
Thesis -
3
The swarm-based exploration algorithm with expanded circle pattern for searching activities
Published 2015“…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
Get full text
Get full text
Get full text
Article -
4
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
6
Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm
Published 2018“…Experiments were carried out to study the performance of our proposed algorithm using publicly activity datasets namely Physical Activity Monitoring for Aging People. …”
Get full text
Get full text
Conference or Workshop Item -
7
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
9
Active power optimization based on non adaptive immune algorithm: article
Published 2010“…This paper presents a study of active power optimization based on non adaptive immune algorithm (NAIA) in power systems. …”
Get full text
Get full text
Article -
10
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…The final prototype is developed by using the control protocol algorithm to activate the system and control all the street lights simultaneously based on the presence of objects. …”
Get full text
Get full text
Monograph -
11
Integration of dual intelligent algorithms in shunt active power filter
Published 2013“…This paper presents an integration of dual intelligent algorithms: artificial neural network (ANN) based fundamental component extraction algorithm and fuzzy logic based DC-link voltage self-charging algorithm (fuzzy self-charging algorithm), in a three-phase three-wire shunt active power filter (SAPF). …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions
Published 2017“…Additionally, the proposed STF-based ADALINE algorithm implements the modified Widrow-Hoff (W-H) weight updating algorithm for fast generation of reference current. …”
Get full text
Get full text
Article -
14
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017Get full text
Get full text
Conference or Workshop Item -
15
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Activity recognition based on accelerometer sensor using combinational classifiers
Published 2015Get full text
Get full text
Conference or Workshop Item -
17
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The development on Web Application system uses An ActiveX technology approach. The Genetic Algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System is also proposed based on general combinatorial optimization algorithm. …”
Get full text
Get full text
Thesis -
18
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Application of genetic algorithm for fuzzy rules optimization on semi expert judgment automation using Pittsburg approach
Published 2023“…This paper presents the optimization of fourteen fuzzy rules for semi expert judgment automation of early activity based duration estimation in software project management. …”
Article
