Search Results - (( variable information modified algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- variable information »
- information modified »
- java application »
-
1
Optimized clustering with modified K-means algorithm
Published 2021“…In order to obtain the optimum number of clusters and at the same time could deal with correlated variables in huge data, modified k-means algorithm was proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
An algorithm for pulsed activation of solenoid valves for variable rate application of agricultural chemicals
Published 2008Get full text
Get full text
Conference or Workshop Item -
3
Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment
Published 2017“…The proposed strategy is dependent on modified Zimmermanns approach for handling all inexact operating costs, data capacities, and demand variables. …”
Get full text
Get full text
Thesis -
4
Modification of a commercial PWM sprayer control system for precision farming application
Published 2008Get full text
Get full text
Conference or Workshop Item -
5
Parameter extraction of single, double, and three diodes photovoltaic model based on guaranteed convergence arithmetic optimization algorithm and modified third order Newton Raphso...
Published 2022“…The proposed guaranteed convergence arithmetic optimization algorithm based on efficient modified third order Newton Raphson (GCAOAEmNR) method highlights important contributions to the literature in terms of methodology (explorer-exploiter phases) and objective function design. …”
Get full text
Get full text
Article -
6
Optimizing n-1 contingency rankings using a nature-inspired modified sine cosine algorithm
Published 2025“…A novel approach utilizing the Modified Sine Cosine Algorithm (MSCA), a nature-inspired metaheuristic optimization technique, is proposed to resolve (N-1) contingency rankings efficiently. …”
Get full text
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Multi-Objective Optimisation of CNC Milling Process for Al 6061 using Modified NSGA-II
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Power System State Estimation In Large-Scale Networks
Published 2010“…The results show that AR methods managed to accurately predict the data and filter the weigthage factors for the bad measurements. Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
Information Theoretic-based Feature Selection for Machine Learning
Published 2018“…And the few existing ones that can work for regression tasks were recently found to underestimate mutual information between two strongly dependent variables. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis -
15
Zero distortion-based steganography for handwritten signature
Published 2018“…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. …”
Get full text
Get full text
Thesis -
18
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Green retrofitting of building using BIM-based sustainability optimization
Published 2024“…In this study, the design variables selection has been fulfilled according to the local environmental sustainability.…”
Get full text
Get full text
Get full text
Article -
20
Green retrofitting of building using BIM-based sustainability optimization
Published 2024“…In this study, the design variables selection has been fulfilled according to the local environmental sustainability.…”
Get full text
Get full text
Get full text
Article
