Search Results - (( post generation based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Fire severity and post-fire generation using : Landsat [NDVI], [NBR] and [SAVI] / Nur Izzaty Dali by Dali, Nur Izzaty

    Published 2018
    “…The result of percentage of NDVI area for pre-fire and post-fire in 2013 until 2015 the dense vegetation more decreasing number of vegetation in that area it show based on percentage of pre-fire more than from result of post-fire. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    3D character reconstruction from 2D orthogonal images by Kok, Yung Thow

    Published 2025
    “…The algorithm can generate primitive shape from at least two orthogonal view images. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Computer-generated fractals with medical application in trabecular bone structure / Hizmawati Madzin by Hizmawati , Madzin

    Published 2006
    “…The fractal is generated using a form of computer-generated process to create complex, repetitive, mathematically based geometric shapes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    The implementation of post-processing data thinning for multibeam echo sounding data by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2006
    “…Comparisons on the final results based on these three algorithms will be discussed in order to decide which algorithm is most favorable to be used in post-processing data thinning for cleaned MBES dataset. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A Genetic Algorithm for the Real-world University Course Timetabling Problem by Chee, Hung Wong, Goh, Say Leng, Jonathan Likoh Juis @ Juise

    Published 2022
    “…In this work, we propose a Genetic Algorithm (GA) in addressing a post enrolment course timetabling (PECTT) problem for University Malaysia Sabah-Labuan International Campus (UMS-LIC). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Subspace Approach for Extracting Signals Highly Corrupted by Colored Noise by Yusoff, Mohd Zuki, Hussin, Fawnizu Azmadi

    Published 2010
    “…The simulation results produced by the post-modified SSA2 algorithm, show a higher degree of consistencies in detecting the VEP's P100, P200, and P300 peaks, in comparisons to the pre-modified SSA1 method. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    An adaptive data replication and placement for efficient data storage of online social networks using two-tier multi-cloud environment by Al-Dailamy, Ali Y., Muhammed, Abdullah, Latip, Rohaya, Abdul Hamid, Nor Asila Wati, Esmail, Waidah

    Published 2022
    “…A simulation using synthesized workload generated based on a real Facebook statistic dataset shows that the proposed algorithms produce a cost savings of more than 23%.…”
    Get full text
    Get full text
    Article
  12. 12

    Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud by Aldailamy, Ali Y., Muhammed, Abdullah, Latip, Rohaya, Hamid, Nor Asilah Wati Abdul, Ismail, Waidah

    Published 2024
    “…A simulation using a synthesized workload generated based on a real Facebook statistic dataset shows that the proposed algorithms produce a monetary cost savings of more than 23 compared to the Static Replication and Local Placement (SRLP) algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Therefore, this was not incorporated in BBN models. Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    A corrective action scheme for contingency monitoring of transmission line overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling has been applied to mitigate the transmission line overloading in system contingency conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article