Search Results - (( java application reoptimize algorithm ) OR ( issues construction process algorithm ))

Refine Results
  1. 1

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
    text::Thesis
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing by Kamal Z., Zamli

    Published 2016
    “…Addressing this issue, this paper proposes the adoption and enhancement of the meta-heuristic algorithm, called Teaching Learning based Optimization (TLBO), to optimize the flood evacuation routing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network by Ahmad, Puteri Azwa, Mahmuddin, Massudi, Omar, Mohd Hasbullah

    Published 2013
    “…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Topology control in heterogeneous wireless sensor networks / Nafiseh Ahadi by Ahadi, Nafiseh

    Published 2011
    “…Topology control algorithms are energy efficient mechanisms that extend lifetime of the WSN witch include tow processes, construction and maintenance. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python by Arifin, Samsul, Muktyas, Indra Bayu, Al Maki, Wikky Fawwaz, Mohd Khairul Bazli, Mohd Aziz

    Published 2022
    “…Bitwise operations make this algorithm run very fast. The algorithm constructed by the researcher is a modification of Komosko, etc.’s algorithm in 2015 and it is the key result of this research. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.] by Mat, Nur Haziqah, Ahmad Zahida, Athifa Aisha, Abdul Malik, Siti Nurhaliza, Azmadi, Nur Athirah Syuhada, Senin, Syahrul Fithry

    Published 2021
    “…The demand of experienced inspectors also presents a challenge for the pressing lack of highly skilled and experienced construction inspectors. To overcome the issues, datasets of reinforced concrete damage images are intelligently trained and classified by selected Machine Learning algorithms such as Naïve- Bayesian, Discriminant Analysis, K-Nearest Neighbor, and Support Vector Machine. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Central to the goal of meeting this need is the issue of appropriate techniques for manufacturing process planning optimization in reconfigurable manufacturing, i.e. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…Despite attempts to optimize LSB, these issues persist due to (1) the formulation of the optimization suffering from non-valid implicit constraints, causing inflexibility in reaching optimal embedding, (2) lacking convergence in the searching process, where the message length significantly affects the size of the solution space, and (3) issues of application customizability where different data require more flexibility in controlling the embedding process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Applying machine learning and particle swarm optimization for predictive modeling and cost optimization in construction project management by almahameed, Bader aldeen, Bisharah, Majdi

    Published 2024
    “…Particle Swarm Optimization (PSO) has demonstrated its efficacy in addressing the issue of construction waste reduction and enhancing the accuracy of cost estimation through the identification of optimal combinations of variables. …”
    Get full text
    Get full text
    Article
  16. 16

    A Bayesian parameter learning procedure for nonlinear dynamical systems via the ensemble Kalman filter by Ur Rehman, M.J., Dass, S.C., Asirvadam, V.S.

    Published 2018
    “…Within the parameter learning steps, the MCMC algorithm requires to perform state estimation for which the target distribution is constructed by using the Ensemble Kalman filter (EnKF). …”
    Get full text
    Get full text
    Article
  17. 17

    System identification of an interacting series process for real-time model predictive control by M.N., Karsiti, T.C.S., Wibowo, N., Saad

    Published 2009
    “…The selected model is able to well reproduce the main dynamic characteristics of gaseous pilot plant in open loop and produces zero steady-state errors in closed loop control system. Several issues concerning the identification process and the construction of MIMO state space model are discussed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automated recognition of Ficus deltoidea using ant colony optimization technique by Ishak, Asnor Juraiza, Che Soh, Azura, Marhaban, Mohammad Hamiruce, Khamis, Shamsul, Ghasab, Mohammad Ali Jan

    Published 2013
    “…This paper presents innovative method to improve the accuracy of classification as well the efficiency, such that irrelevant features that make computational complexity are ignored by feature subset selection that is proposed by means of ant colony optimization algorithm (ACO). At first, through image processing specified features are extracted from the Ficus deltoidea leaves such as vein, morphology and texture features and they construct a search space to be chosen for the optimal subset features that is selected by ACO algorithm as support vector machine (SVM) classify them. …”
    Get full text
    Get full text
    Conference or Workshop Item