Search Results - (( java application reoptimize algorithm ) OR ( construct equalization based algorithm ))

Refine Results
  1. 1

    A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem by Sultana, Tanzima, Akhand, Md Aminul Haque, Rahman, M.M. Hafizur

    Published 2017
    “…Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Enhancing the Sorting Layers in the Initial Stage of High School Timetabling by Arbaoui, Billel, Wahid, Juliana, Abdul-Rahman, Syariza

    Published 2020
    “…The high school timetabling problem (HSTP) is considered as an NP-Complete problem as the optimal solution for it, is still not discovered by any algorithm. Generally, NP-Complete problem was solved firstly by constructing the initial solution, in the construction phase. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…Based on the findings, Algorithm 2 outperforms Algorithm 1 in classifying the minority group, while both proposed algorithms perform equally well in classifying the majority group. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A combinatory algorithm of univariate and multivariate gene selection by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2009
    “…The results show that the mean of misclassification error of training samples in 100 iteration are almost equal in two algorithms but our algorithm have the better ability to classify independent samples.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128 by Omar @ Othman, Wan Zariman, Mohd Jawi, Suhairi, Kamel Ariffin, Muhammad Rezal, Mahad, Zahari, Shamsuddin, Solahuddin

    Published 2020
    “…In this algorithm, the Boolean function given with coefficients, n is equal to ten (10) and its degree, d is equal to six (6). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Artificial Bee Colony-based satellite image contrast and brightness enhancement technique using DWT-SVD by Bhandari, A.K., Soni, V., Kumar, A., Singh, G.K.

    Published 2014
    “…The proposed technique is based on the Artificial Bee Colony (ABC) algorithm using Discrete Wavelet Transform and Singular Value Decomposition (DWT-SVD). …”
    Get full text
    Get full text
    Article
  8. 8

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Applying empirical thresholding algorithm for a keystroke dynamics based authentication system by Venugopal, Priya Chaliyath, Viji, Kamalan Saroja Angel

    Published 2019
    “…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi by Abdul Hadi, Basharudin

    Published 2017
    “…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network 29 30 base of the specimen until the flow ceased..…”
    Get full text
    Get full text
    Book Section
  12. 12

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Objective assessment of psoriasis lesion thickness for PASI scoring 3D digital imaging by Hurriyatul , Fitriyah, Ahmad Fadzil, M Hani

    Published 2010
    “…Validation on lesion base construction is performed using twelve body curvature models and show good result with coefficient of determinant (R2) is equal to 1.…”
    Get full text
    Citation Index Journal
  14. 14
  15. 15

    New Sequential and Parallel Division Free Methods for Determinant of Matrices by Sharmila, Karim

    Published 2013
    “…Therefore, two parallel strategies were developed to parallelise this algorithm so as to reduce the computation times. Numerical results showed that the parallel methods were able to compute determinants faster than the sequential counterparts, particularly when the tasks were equally allocated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…Risks are inherently present In all construction projects. Quite often, construction projects fail to achieve their time quality and budget goals. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    An improved partial comparison optimization for utilizing landfill facilities in a waste collection vehicle routing problem by Fazlini, Hashim

    Published 2025
    “…The improved PCO incorporates a Nearest Greedy (NG) algorithm for initial solution construction, dynamic parameter adjustment, and two additional neighborhood operators. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Optimization of operations of reservoir systems for hydropower generation in Tigris River Basin, Iraq by Al-Aqeel, Yousif Hashim Abdullah

    Published 2016
    “…In the first strategy, the target storage at the end of final month is equal to, or above the minimum operational storage; and for the second strategy it is equal to, or above the initial storage. …”
    Get full text
    Get full text
    Thesis