Search Results - (( problem implication based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- problem implication »
- application during »
- implication based »
- java application »
- during algorithm »
-
1
-
2
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. …”
Get full text
Get full text
Book Section -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
Get full text
Get full text
Thesis -
6
Computing the maximum violation of a Bell inequality is an NP-problem
Published 2016“…The proof that the optimization of such correlation measure is an NP-problem based on an operational perspective involving a Turing machine, which follows a general algorithm. …”
Get full text
Get full text
Article -
7
-
8
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
The effectiveness of problem-based serious games on learning and learning motivation in the context of 3D computer graphics / Meisam Moradi
Published 2022“…This study and the game design in this study can have pedagogical and practical implications for 3D computer graphics lecturers and those who are interested in designing effective problem-based SGs. …”
Get full text
Get full text
Get full text
Thesis -
11
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Therefore, a new space-time fuzzy implication operator is introduced, by modifying the existing implication operators to accommodate time as an added dimension. …”
Get full text
Get full text
Thesis -
12
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
Get full text
Get full text
Get full text
Article -
13
-
14
A hybrid deep learning-based unsupervised anomaly detection in high dimensional data
Published 2022“…Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. …”
Get full text
Get full text
Article -
15
-
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
A balanced partitioning mechanism for multicontroller placement in software-defined wide area networks
Published 2022“…Consequently, the objective of this study is to propose a Balanced Partitioning Mechanism (BPM) based on the notion of a network partition. Moreover, the BPM is designed based on a modified K-means algorithm. …”
Get full text
Get full text
Thesis -
18
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…On the other hand maximal itemset based association rules, that are a subset of closed itemset based rules, show to be insufficient in this regard, and typically will have worse recall and generalization power. …”
Get full text
Get full text
Article -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…To achieve these goals, computational mathematics problem based learning (CM-PBL) instructional strategy is developed to promote an active learning environment for classroom management involving problem solving. …”
Get full text
Get full text
Conference or Workshop Item
