Search Results - (( program location based algorithm ) OR ( java application modified algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Differential equation fault location algorithm with harmonic effects in power system by Izatti, Md Amin, Mohd Rafi, Adzman, Haziah, Abdul Hamid, Muhd Hafizi, Idris, Melaty, Amirruddin, Omar, Aliman

    Published 2023
    “…Based on the simulation results, the differential equation continuous wavelet technique (CWT) filter-based algorithm produced an accurate fault location result with a mean average error (MAE) of less than 5%.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…Further more, an improved non-dominated sorting genetic algorithm with an elite strategy II (IMNSGA-II) has been developed to solve the two bi-objective models, surpassing existing literature’s algorithms such as Pareto Envelope-based Selection Algorithm II (PESA-II) and NSGA-II. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…In this research, a fingerprinting-based location algorithm is applied in indoor environments using WLAN. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir by Sambo, C.H., Hematpour, H., Danaei, S., Herman, M., Ghosh, D.P., Abass, A., Elraies, K.A.

    Published 2016
    “…The proposed location of wells has improved Net Present Value (NPV) by + 10 higher than the base case without infill wells. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Solving vehicle routing problem by using improved K-nearest neighbor algorithm for best solution by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Hamed, Raed Ibraheem, A. Mostafa, Salama, Ahmed Ibrahim, Dheyaa, Jameel, Humam Khaled, Alallah, Ahmed Hamed

    Published 2017
    “…Approach: The approach has been presented based on two phases: firstly, the algorithms have been adapted to solve the research problem, where its procedure is different than the common algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In addition, single communication on the smart meter has limiting the location suitability of the meter. Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Effective software fault localization based on complex network theory / Abubakar Zakari by Abubakar , Zakari

    Published 2019
    “…Ochiai coefficient and Tarantula coefficient) and an existing fault localization technique based on software network centrality measures. FLCN-S shows significant improvement in terms of localization effectiveness on single-fault programs in comparison with Ochiai based and Jaccard-based techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20