Search Results - (( problem implication _ algorithm ) OR ( java application during algorithm ))
Search alternatives:
- problem implication »
- application during »
- java application »
- during algorithm »
-
1
-
2
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
3
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. …”
Get full text
Get full text
Book Section -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
A new inexact line search method for convex optimization problems
Published 2013“…In general one can say that line search procedure for the steplength and search direction are two important elements of a line search algorithm. The line search procedure requires much attention because of its far implications on the robustness and efficiency of the algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Modified Harris Hawks Optimization Algorithm For Protein Multiple Sequence Alignment
Published 2024“…Consequently, the hho algorithm has been chosen as a potential remedy to confront the accuracy dilemmas intrinsic to msa.…”
Get full text
Get full text
Thesis -
10
-
11
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
12
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
13
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
14
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
15
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…On the other hand, FWZIC effectively computes the important weight of the criteria with zero inconsistency. The implications of this study bring benefits to the optimization community, industrial and researchers by providing exhaustive evaluation methodology for evaluating MaOO algorithms, which can be generalized to solve such problem effectively.…”
Get full text
Get full text
Thesis -
16
Computing the maximum violation of a Bell inequality is an NP-problem
Published 2016“…The proof that the optimization of such correlation measure is an NP-problem based on an operational perspective involving a Turing machine, which follows a general algorithm. …”
Get full text
Get full text
Article -
17
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
Get full text
Get full text
Get full text
Article -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
