Search Results - (( java implication based algorithm ) OR ( third generation using algorithm ))
Search alternatives:
- implication based »
- java implication »
- third generation »
- generation using »
- using algorithm »
-
1
An improved Levenshtein algorithm for spelling correction word candidate list generation
Published 2016“…The most widely used algorithm for generating candidates’ list for incorrect words is based on Levenshtein distance. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy
Published 2021“…The Seagull Optimization Algorithm was then used to find two heading parameters of the TPHRs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…To demonstrate the practicality of using artificial intelligence (AI) to address these problems, the genetic algorithm is applied to genetic engineering (genetic mutation) of cowpea in a crop improvement program to generate useful bioinformatic information for further improvement of the crop. …”
Get full text
Get full text
Get full text
Article -
5
Optimization of ship routing using hybrid genetic algorithm / Ismail
Published 2014“…The second experiment is to generate routes using three algorithms discussed in the research. …”
Get full text
Get full text
Thesis -
6
Handover initiation algorithm in hierarchical macrocell/femtocell In LTE network / Abdul Azim Mad Diah
Published 2013“…The fourth generation (4G) wireless technology known as Long Term Evolution (LTE) allows cellular operators to use new and wider spectrum and complements third generation (3G) networks with higher user data rates, lower latency and flat Internet Protocol (IP)-based network architecture. …”
Get full text
Get full text
Thesis -
7
The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification
Published 2020“…On the other hand, BFOA-S showed competitive performance in the comparison against ten existing IS algorithms by obtaining 96.25% in reduction rate and ranked third in the ranking. …”
Get full text
Get full text
Get full text
Thesis -
8
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
9
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…The third stage of the thresholding algorithm aims to distinguish between defects and high noise generated by sedimentation on the surface of the tank and reduce its impact. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques
Published 2018“…Secondly, this approach hybridizing the FA with the rough algorithm (RA), where RA is used to control the steps of randomness for the FA while optimizing the weights of the standard BPNN model. …”
Get full text
Get full text
Thesis -
12
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
Get full text
Get full text
Thesis -
13
Non-darcy newtonian liquid flow with internal heat generation using boundary conditions of the third kind of fully developed mixed convection in a vertical channel
Published 2023“…A fully developed non-Darcy flow using boundary conditions of the third kind with internal heat generation in a vertical channel is selected as the mathematical model. …”
Get full text
Get full text
Get full text
Article -
14
Performance comparison of downlink packet scheduling algorithms in LTE network
Published 2014“…Different traffic types are used, and Simulation results show that in video traffic, FLS and EXP algorithms provide a higher system throughput compared to other algorithms while keeping the delay and packet loss ratio small. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Solving nonlinear system of third-order boundary value problems using block method
Published 2014“…In this paper, we propose an algorithm of two-point block method to solve the nonlinear system of third-order boundary value problems directly. …”
Get full text
Get full text
Conference or Workshop Item -
16
Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor
Published 2018“…Second, the inner loop of each face having depression feature is covered by generating a new face. Third, a lofting operation is performed between new faces to generate feature volume for the depression feature and fourth, the algorithm utilizes vertex attributes of feature volume to recognize feature type. …”
Get full text
Get full text
Article -
17
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system
Published 2009“…The performance evaluation is conducted using the downlink third generation partnership project long term evolution (3GPP LTE) system as the simulation platform. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Second Level Password Generator
Published 2010Get full text
Get full text
Conference or Workshop Item -
20
Facial features point localization using modified SIFT scale space / Zulfikri Paidi
Published 2020“…Four different facial expressions were selected from each database; neutral, smile, sad, and surprise. Three tests were used on the original SIFT algorithm and modified SIFT. …”
Get full text
Get full text
Thesis
