Search Results - (( site solution using algorithm ) OR ( java application reoptimize algorithm ))

Refine Results
  1. 1

    A greedy heuristics multiple criteria model for solving multi-landfill site selection and plant propagation algorithm for improving waste collection vehicle routing solutions by Nur Azriati, Mat

    Published 2023
    “…The WCVRP solutions using PPA are comparable with other best-known solutions on the benchmark problem in terms of total distance travelled and the number of vehicles used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…The second layer employed spatial data and the fuzzy Technique for Order Preference by Similarity to Ideal Solution algorithm to refine potential solar energy sites, yielding the top 100 optimal locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Ancestral dynamic voting algorithm for mutual exclusion in partitioned distributed systems by Zarafshan, Faraneh, Karimi, Abbas, Al-Haddad, Syed Abdul Rahman, Saripan, M. Iqbal, Subramaniam, Shamala

    Published 2013
    “…Mutual exclusion becomes difficult when a distributed system is partitioned into two or more isolated groups of sites. In this study, a new dynamic algorithm is presented as a solution for mutual exclusion in partitioned distributed systems. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Integration Of Travel Time Zone For Optimal Siting Of Emergency Facilities by Indriasari, Vini

    Published 2008
    “…Hence, the z values were sufficient to measure solution qualities yielded by the algorithms. Integration of the site suitability evaluation and tessellations has been proved workable to obtain scattered candidate sites that allow good solutions to be achieved in the optimization process. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An improved partial comparison optimization for utilizing landfill facilities in a waste collection vehicle routing problem by Fazlini, Hashim

    Published 2025
    “…Thus, this study introduces a new constraint to ensure the effective use of all landfill sites in WCVRP. To integrate this constraint, an enhanced Partial Comparison Optimization (PCO) algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Truck queuing analysis at landfill sites in a waste collection vehicle routing problem by Benjamin, Aida Mauziah, Ku-Mahamud, Ku Ruhana, Idrus, Zanariah

    Published 2017
    “…The analysis is based on a solution of two datasets from a benchmark waste collection problem using the nearest greedy heuristic algorithm.In this problem, all drivers need to have a one-hour rest break during their collection.The rest break can start from 11.00 a.m. to 12.00 p.m. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  10. 10

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Wi-Fi signals database construction using chebyshev wavelets for indoor positioning systems by Narzullaev, Anvar, Muminov, Zahriddin, Ibragimov, Gafurjan

    Published 2019
    “…The field tests as well as computer simulation results showed significant improvement in signal strength prediction accuracy compared to existing approximation algorithms. Furthermore, the proposed algorithm can recover missing signal values with much smaller number of on-site measurements compared to conventional calibration algorithm.…”
    Get full text
    Get full text
    Article
  14. 14

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…Using ResNet, the algorithm can learn more complex and nuanced patterns in the data, leading to more accurate recommendations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Hospital site suitability assessment using three machine learning approaches: evidence from the Gaza strip in Palestine by Almansi, Khaled Yousef, Mohamed Shariff, Abdul Rashid, Abdullah, Ahmad Fikri, Syed Ismail, Sharifah Norkhadijah

    Published 2021
    “…The results of the predicted sites were validated using CFS cross-validation and the receiver operating characteristic (ROC) curve metrics. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Outdoor User Location over 802.11 Ad-hoc Network by Roslan, Mohd Azrik

    Published 2006
    “…At the end of this work, the site testing has validated that this algorithm can be used to determine the user location in outdoor environment with considerable accuracy.…”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Prognostic Health Management of Pumps Using Artificial Intelligence in the Oil and Gas Sector: A Review by Aliyu, R., Mokhtar, A.A., Hussin, H.

    Published 2022
    “…Data models can be trained using machine learning and statistical ideas, employing condition data and on-site feedback. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    TRMM Satellite Algorithm Estimates to Represent the Spatial Distribution of Rainstorms by Marina, Patrick, Mah, Yau Seng, Putuhena, Frederik Josep, Wang, Yin Chai, Onni Suhaiza, Selaman

    Published 2016
    “…Hence, satellite-based algorithm estimates are introduced as an innovative solution to these challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of bi-objective optimization model for supply chain network design using data envelopment analysis by Rahimi, Iman

    Published 2017
    “…Analysis of the results expressed acceptable performance of the developed model and proposed solution for different cases in different sizes. The developed model and solution method show excellence performance in terms of CPU time for the large scale. …”
    Get full text
    Get full text
    Thesis