Search Results - (( modification location based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
-
1
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…Proposed modifications to two existing algorithms, based on mode shape, for locating of damage in a beam like structure model are presented in this paper. …”
Get full text
Get full text
Article -
2
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…This project includes the modification of main algorithm which has been implemented in the prototype development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…Indoor localisation techniques in multi-floor environments are emerging for location based service applications. Developing an accurate location determination and time-efficient technique is crucial for online location estimation of the multi-floor localisation system. …”
Get full text
Get full text
Thesis -
4
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Article -
5
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Image authentication using Zernike moment watermarking
Published 2013“…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. Using two different watermarks lead to a good classification of incidental and malicious modifications and locating the tampered areas. …”
Get full text
Get full text
Thesis -
7
An improved marine predators algorithm tuned data-driven multiple-node hormone regulation neuroendocrine-PID controller for multi-input–multi-output gantry crane system
Published 2023“…First modification involved a random average location calculation within the algorithm’s updating mechanism to solve the local optima issue. …”
Get full text
Get full text
Get full text
Article -
8
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…The proposed work has been compared to GA-based technique, module modification technique and Simulated Annealing technique related to QR code readability, embedded logo visual quality and high embedded data capacity. …”
Get full text
Get full text
Get full text
Thesis -
9
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…In mobile environment, when the source is mobile and migrates to a new location, the multicast tree needs to be rebuilt. AMTree is an active network based protocol intended to make the sending packets to the tree after source migration an efficient process without much modifications to the multicast tree. …”
Get full text
Get full text
Thesis -
10
Eccentricity Optimization of NGB System by using Multi-Objective Genetic Algorithm
Published 2009“…Boundary equations are set by introducing feasible area to avoid improper individuals followed by utilization of some operators such as selection, mutation, crossover and elite genetic algorithm. Based on the plain aggregate approaches for transforming the objective vector in scalar, some modifications are proposed to assist designers in making decision on prioritizing between the frame stiffness and brace frame weight in their design.…”
Get full text
Get full text
Article -
11
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
Get full text
Get full text
Get full text
Thesis -
12
Balancing exploration and exploitation in ACS algorithms for data clustering
Published 2019“…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. …”
Get full text
Get full text
Get full text
Article -
13
A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping
Published 2016“…The efficiency of the proposed algorithm was investigated by dividing the validation data into two groups. …”
Get full text
Get full text
Get full text
Article -
14
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…Several conventional adaptive distance relay (ADR) and computational based intelligent modifications presented to solve the impending compromise by using faulted line voltage and current parameters for the various protection relay controller modification, optimizing synchronized measurement to block or limit the fault current penetration into the grid. …”
Get full text
Get full text
Thesis -
15
Supervised evolutionary programming based technique for multi-DG installation in distribution system
Published 2023“…Installing DG in network system, has supported the distribution system to provide the increasing number of consumer demand and load, in order to achieve that this paper presents an efficient and fast converging optimization technique based on a modification of traditional evolutionary programming method for obtain the finest optimal location and power loss in distribution systems. …”
Article -
16
Spiral-based manta ray foraging optimization to optimize PID control of a flexible manipulator
Published 2020“…This paper presents a Spiral-based Manta Ray Foraging Algorithm (SMRFO). It is an improvement of Manta Ray Foraging Algorithm (MRFO). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
18
Web-based volunteer management system
Published 2025“…Key innovations include a weighted skill-matching algorithm that evaluates both skills importance level required and volunteer proficiencies, a distance-based matching algorithm using Google Maps Distance Matrix API, and leaderboard gamification elements for volunteer contribution recognition. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…The performance of a Malay stemming algorithm is tested based on words beginning with letter 'p', 'q', 'y' and 'z', using 5 experiments. …”
Get full text
Get full text
Thesis -
20
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis
