Search Results - (( processes specification max algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- processes specification »
- customization algorithm »
- specification max »
- java application »
- max algorithm »
-
1
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
Get full text
Get full text
Thesis -
2
-
3
Lambda-max criteria weight determination in an adaptive neuro-fuzzy inference system / Rosma Mohd Dom, Daud Mohamad and Ajab Bai Akbarally
Published 2012“…A neuro-fuzzy system is a fuzzy system that uses learning algorithms derived from or inspired by neural network theory to determine its parameters (fuzzy sets and fuzzy rules) by processing data samples. …”
Get full text
Get full text
Research Reports -
4
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…Each sensor node is responsible for collecting specific data and transmitting it to the processing center. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
The effect of data preprocessing on the performance of artificial neural networks techniques for classification problems
Published 2012“…Specifically Min-Max, Z-Score and Decimal Scaling Normalization preprocessing techniques were evaluated. …”
Get full text
Get full text
Get full text
Thesis -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
-
8
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…Face anti-spoofing is a revolutionary technology involved in various aspects of daily life. Specifically, facial anti-spoofing is a detection process that involves using printed or even keepsakes to mimic genuine facial appearances, and it is related to the facial detection application. …”
Get full text
Get full text
Thesis -
9
Predicting STEM academic performance in secondary schools: data mining approach
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Automated plaque classification using computed tomography angiography and Gabor transformations
Published 2019“…The automated technique is based on various features that are extracted from the Gabor transform of the acquired CTA images. Specifically, seven features are extracted from the Gabor coefficients: energy, and Kapur, Max, Rényi, Shannon, Vajda, and Yager entropies. …”
Get full text
Get full text
Article -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Lysine and methionine production from agro-waste submerged fermentation using locally isolated lactic acid bacteria
Published 2016“…Prediction of ANN models indicated that using molasses (10.02 g/L), fish meal (18 g/L), glutamic acid (1.17 g/L) and initial medium pH (4.26) was the greatest combination.The cultivation of P. pentosaceus RF-1 for lysine-methionine productions was carried out in 2 L stirred-tank bioreactor using batch and continuous mode of operations. The maximum specific growth rate (μmax) of 0.306 h-1 was obtained during the batch cultivation process. …”
Get full text
Get full text
Get full text
Thesis
