Search Results - (( using active issues algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- issues algorithm »
- java application »
- active issues »
- using active »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity
Published 2014“…An active method which has received much attention is the use of Active Noise Control (ANC) system which involves an electro acoustic system that cancels unwanted noise using the principle of superposition. …”
Get full text
Get full text
Thesis -
3
PREDICTIVE ANALYTICS FOR EQUIPMENT FAILURE BY USING GATED RECURRENT UNIT – GENETIC ALGORITHM (GRU – GA)
Published 2023“…Hence, the issue can be solved by adopting a prediction activity to monitor and predict the state of equipment in advance. …”
Get full text
Get full text
Thesis -
4
-
5
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…This paper addressed some of these issues to bring face recognition more closely to being useful for real-life applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity
Published 2016“…Adaptive algorithms are prevalently applied in the design of nonlinear active noise control (ANC) systems. …”
Get full text
Get full text
Get full text
Article -
7
Channel Assignment Algorithms in Cognitive Radio Networks: Taxonomy, Open Issues, and Challenges
Published 2016“…A challenging aspect of such algorithms is the incorporation of the channels' diverse characteristics, highly dynamic network conditions with respect to primary users' activity, and different fragmented sizes of the available channels. …”
Get full text
Get full text
Article -
8
Pre-emptive resource-constrained multimode project scheduling using genetic algorithm: a dynamic forward approach
Published 2016“…Purpose: The issue resource over-allocating is a big concern for project engineers in the process of scheduling project activities. …”
Get full text
Get full text
Get full text
Article -
9
An improved bees algorithm local search mechanism for numerical dataset
Published 2015“…Bees Algorithm (BA), a heuristic optimization procedure, represents one of the fundamental search techniques is based on the food foraging activities of bees. …”
Get full text
Get full text
Get full text
Thesis -
10
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009“…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…This technique is challenged by the nature of IoT technology and perceived data, as well as by human differences, which necessitated additional processing tasks to select significant features for the learning algorithms. In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
Get full text
Get full text
Article -
12
-
13
Balancing exploration and exploitation in ACS algorithms for data clustering
Published 2019“…The performance of the proposed algorithm is compared with that of several common clustering algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
14
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…The primary idea is to perform active measurements using the applications’ packets instead of using extra probe packets. …”
Get full text
Get full text
Thesis -
15
Utilizing Classifier Algorithms to Analyze Lending Activity at The Sumsel Babel Bank's Pagar Alam Branch
Published 2023“…In this research, a classifier algorithm was applied to create a prediction model to predict the customer before the lending application was used and process to pass the lending process in Bank Sumsel, branch Pagar Alam. …”
Get full text
Get full text
Get full text
Article -
16
Shuffling algorithms for automatic generator question paper system.
Published 2010“…The results indicate shuffling algorithm could be used to overcome randomization issue for GQS.…”
Get full text
Get full text
Article -
17
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
Article -
18
Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM)
Published 2018“…Precise and strong location of trait point is a complicated and difficult issue in face recognition. Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…Artificial neural network (ANN) are widely used as an engineering approach to mimic the human brain activities. …”
Get full text
Get full text
Thesis -
20
Cluster optimization in VANET using MFO algorithm and K-Means clustering
Published 2023“…Improving clustering efficiency by sending frequent updates to the CH in term of improving scalability, coverage, and clustering result, while reducing communication and energy consumption. Overall, the MFO Algorithm and K-Means algorithm can be used in combination to optimize the clustering in VANET, leading to better network performance, more reliable communication, and improved efficiency.…”
Get full text
Get full text
Conference or Workshop Item
