Search Results - (( variable chain efficient algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- chain efficient »
- variable »
-
1
Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi
Published 2018“…In order to solve the model, a multi-objective particle swarm optimization (MOPSO) approach was applied. The efficiency of the algorithm was compared to a multi-objective genetic algorithm (MOGA) as well. …”
Get full text
Get full text
Get full text
Thesis -
2
A proposed variable parameter control chart for monitoring the multivariate coefficient of variation
Published 2019“…An efficient process monitoring system is important for achieving sustainable manufacturing. …”
Get full text
Get full text
Article -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
Published 2025“…The study employed two MLC frameworks: Problem Transformation methods (Binary Relevance, Classifier Chains, Label Power Set, and Calibrated Label Ranking) and Algorithm Adaptation. …”
Get full text
Get full text
Thesis -
5
Model for responsive agriculture hub via e-commerce to sustain food security
Published 2024“…The model integrates data-driven decision-making, supply chain optimization, and digital marketplaces to enhance the efficiency and resilience of agricultural systems. …”
Get full text
Get full text
Get full text
Article -
6
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Several techniques have been proposed in the past decade, particularly error concealment (EC) algorithms. In this study, attention is focused on the algorithms that have high efficiency to fill-in the damaged patches, for example, Multi-directional interpolation (MDI), neighboring matching EC, etc. …”
Get full text
Get full text
Thesis -
7
Bayesian random forests for high-dimensional classification and regression with complete and incomplete microarray data
Published 2018“…As a further extension, missing covariates problem was also handled by pre-imputing the variables using Multivariate Imputation by Chain Equation (MICE) before building forests. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…For the entire chain of Internet connectivity the Domain Name System (DNS) provides name to address mapping services. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
An integrated model for production line balancing planning
Published 2012“…Automobile manufacturing is one of the most important industries in the world.The production line is one of the main supply chain of this industry.The production line consists of four shops.The shops include many stations. …”
Get full text
Get full text
Thesis -
11
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…We preprocessed the RDF graph to be stored in distributed manner after the elimination of single chain productions in order to increase the efficiency in conversion process. …”
Get full text
Get full text
Thesis
