Search Results - (( java application optimisation algorithm ) OR ( issues construction process algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  3. 3

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
    text::Thesis
  4. 4

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing by Kamal Z., Zamli

    Published 2016
    “…Addressing this issue, this paper proposes the adoption and enhancement of the meta-heuristic algorithm, called Teaching Learning based Optimization (TLBO), to optimize the flood evacuation routing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network by Ahmad, Puteri Azwa, Mahmuddin, Massudi, Omar, Mohd Hasbullah

    Published 2013
    “…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Topology control in heterogeneous wireless sensor networks / Nafiseh Ahadi by Ahadi, Nafiseh

    Published 2011
    “…Topology control algorithms are energy efficient mechanisms that extend lifetime of the WSN witch include tow processes, construction and maintenance. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python by Arifin, Samsul, Muktyas, Indra Bayu, Al Maki, Wikky Fawwaz, Mohd Khairul Bazli, Mohd Aziz

    Published 2022
    “…Bitwise operations make this algorithm run very fast. The algorithm constructed by the researcher is a modification of Komosko, etc.’s algorithm in 2015 and it is the key result of this research. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.] by Mat, Nur Haziqah, Ahmad Zahida, Athifa Aisha, Abdul Malik, Siti Nurhaliza, Azmadi, Nur Athirah Syuhada, Senin, Syahrul Fithry

    Published 2021
    “…The demand of experienced inspectors also presents a challenge for the pressing lack of highly skilled and experienced construction inspectors. To overcome the issues, datasets of reinforced concrete damage images are intelligently trained and classified by selected Machine Learning algorithms such as Naïve- Bayesian, Discriminant Analysis, K-Nearest Neighbor, and Support Vector Machine. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Central to the goal of meeting this need is the issue of appropriate techniques for manufacturing process planning optimization in reconfigurable manufacturing, i.e. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…Despite attempts to optimize LSB, these issues persist due to (1) the formulation of the optimization suffering from non-valid implicit constraints, causing inflexibility in reaching optimal embedding, (2) lacking convergence in the searching process, where the message length significantly affects the size of the solution space, and (3) issues of application customizability where different data require more flexibility in controlling the embedding process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Applying machine learning and particle swarm optimization for predictive modeling and cost optimization in construction project management by almahameed, Bader aldeen, Bisharah, Majdi

    Published 2024
    “…Particle Swarm Optimization (PSO) has demonstrated its efficacy in addressing the issue of construction waste reduction and enhancing the accuracy of cost estimation through the identification of optimal combinations of variables. …”
    Get full text
    Get full text
    Article
  18. 18

    A Bayesian parameter learning procedure for nonlinear dynamical systems via the ensemble Kalman filter by Ur Rehman, M.J., Dass, S.C., Asirvadam, V.S.

    Published 2018
    “…Within the parameter learning steps, the MCMC algorithm requires to perform state estimation for which the target distribution is constructed by using the Ensemble Kalman filter (EnKF). …”
    Get full text
    Get full text
    Article
  19. 19

    System identification of an interacting series process for real-time model predictive control by M.N., Karsiti, T.C.S., Wibowo, N., Saad

    Published 2009
    “…The selected model is able to well reproduce the main dynamic characteristics of gaseous pilot plant in open loop and produces zero steady-state errors in closed loop control system. Several issues concerning the identification process and the construction of MIMO state space model are discussed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
    Get full text
    Get full text
    Get full text
    Thesis