Search Results - (( java identification method algorithm ) OR ( program implementation cell algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    New reflector shaping methods for dual-reflector antenna by Quzwain, Kamelia, Yamada, Yoshihide, Kamardin, Kamilia, Abd Rahman, Nurul Huda, Ismail, Alyani

    Published 2022
    “…First, the equivalent parabola and circle equation is implemented in the reflector shaping algorithms. Second, a Matrix Laboratory (MATLAB) program is developed in order to obtain the main and sub reflector shapes. …”
    Get full text
    Get full text
    Article
  8. 8

    Prioritizing CD4 count monitoring in response to ART in resource-constrained settings: a retrospective application of prediction-based classification by Azzoni, Livio, Foulkes, Andrea S., Liu, Yan, Johnson, Margaret, Smith, Collette, Kamarulzaman, Adeeba, Montaner, Julio, Mounzer, Karam, Saag, Michael, Cahn, Pedro, Cesar, Carina, Krolewiecki, Alejandro, Sanne, Ian, Montaner, Luis J.

    Published 2012
    “…The model uses repeatedly measured biomarkers (white blood cell count and lymphocyte percent) to predict CD4+ T cell outcome through first-stage modeling and subsequent classification based on clinically relevant thresholds (CD4+ T cell count of 200 or 350 cells/ml). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…These existing schemes, however, rely on different types of cryptographic methods that usually have high computation complexity. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…The simulation algorithms of the rainfall-runoff model have operated on grid bases compatible with the MATLAB programming language, which has been used to write instructions to many grid-based operations. …”
    Get full text
    Get full text
    Thesis