Search Results - (( recreation program algorithm ) OR ( prevention program algorithm ))
Search alternatives:
- recreation program »
-
1
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
Get full text
Get full text
Thesis -
2
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
3
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Developing a predictive model for forest fires occurrence is an important activity in a fire prevention program. The model describes characteristics of areas where fires occur based on past fires data. …”
Get full text
Get full text
Get full text
Article -
4
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…It is also found that using appropriate preventive maintenance program can cause up to 75% reduction in cell-load variation. …”
Get full text
Get full text
Thesis -
5
Implementation of Dijkstra Algorithm with React Native to Determine Covid-19 Distribution
Published 2022“…This research implements Dijkstra's Algorithm written in the React Native programming language to build a Covid-19 tracking application. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
Divorce prediction using Naive Bayes / Alia Hannani Ahmad Bakri
Published 2024Get full text
Get full text
Thesis -
8
-
9
Optimized topology control in mobile IP networks using a new parametric routing algorithm
Published 2018“…For this purpose, an Optimal Parametric Topology Control Routing (OPTCR) algorithm is introduced based on parametric linear programming formulation (LPF). …”
Get full text
Get full text
Get full text
Article -
10
Development of a sensor device algorithm and monitoring system for the pin-on-disc (POD) tribometer
Published 2024text::Final Year Project -
11
A STUDY OF PROTECTION SYSTEM TO IMPROVE POWER SYSTEM RELIABILITY USING ATP (ALTERNATIVE TRANSIENT PROGRAM)
Published 2007“…Protective relays cannot prevent faults; they can only limit the damage caused by faults. …”
Get full text
Get full text
Final Year Project -
12
Building customer churn prediction models in Indonesian telecommunication company using decision tree algorithm
Published 2023“…Based on the results, the company is suggested to promote a retention program based in order to decrease customer churn rate.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Numerical simulation of hybrid composite tubes under oblique compression
Published 2017“…A proper contact algorithm is implemented to prevent interpenetration among elements and surfaces. …”
Get full text
Get full text
Get full text
Article -
14
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
15
Evolutionary algorithm for forecastng mean sea level based on meta-heuristic approach
Published 2018“…Genetic Programming (GP) algorithm is an example of an evolutionary algorithm (EA) in the field of evolutionally computation (EC) and, more broadly, in Artificial Intelligence. …”
Get full text
Get full text
Article -
16
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…It will include the coding of python programming coding and calculation of proposed method. …”
Get full text
Get full text
Student Project -
17
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin
Published 2008“…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
Get full text
Get full text
Thesis -
19
Botnet detection using automated script / Norfathin Rosli
Published 2020“…The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. This Botnet are malicious software that controlled networks of hijacked computers and aiming for distributed coordinate network initiate various malicious over network activities including click fraud, spam, and phishing. …”
Get full text
Get full text
Thesis -
20
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Nevertheless, the optimization task requires specific care in order to prevent the issue of overfitting classification model. …”
Get full text
Get full text
Get full text
Thesis
