Search Results - (( variable interaction within algorithm ) OR ( java application during algorithm ))
Search alternatives:
- variable interaction »
- interaction within »
- application during »
- within algorithm »
- java application »
- during algorithm »
-
1
Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei
Published 2020“…The proposed feature selection technique comprises of Multi-objective Binary-valued Backtracking Search Algorithm (MOBBSA). It is used to search within a number of input variables combinations and to select the feature subsets, which minimizes simultaneously vice-versa the estimation error and the feature numbers. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…Combinatorial Interaction Testing (CIT) is an efficient technique for detecting faults caused by interactions among system factors. …”
Get full text
Get full text
Article -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
Get full text
Get full text
Thesis -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Analysis of daytime and nighttime ground level ozone concentrations using boosted regression tree technique
Published 2017“…Sensitivity testing of the BRT model was conducted to determine the best parameters and good explanatory variables. Using the number of trees between 2,500-3,500, learning rate of 0.01, and interaction depth of 5 were found to be the best setting for developing the ozone boosting model. …”
Get full text
Get full text
Get full text
Article -
7
Dynamics and predictive control of gas phase propylene polymerization in fluidized bed reactors
Published 2013“…The open loop analysis revealed the nonlinear behavior of the polypropylene fluidized bed reactor, justifying the use of an advanced control algorithm for efficient control of the process variables. …”
Get full text
Article -
8
Dynamics and predictive control of gas phase propylene polymerization in fluidized bed reactors
Published 2013“…The open loop analysis revealed the nonlinear behavior of the polypropylene fluidized bed reactor, justifying the use of an advanced control algorithm for efficient control of the process variables. …”
Get full text
Get full text
Article -
9
Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization
Published 2022“…The solution space design in CFM combined two variables: the first is the probability of forwarding and the second is the maximum number of nodes within one cluster. …”
Get full text
Get full text
Article -
10
Development of two matheuristics for production-inventory-distribution routing problem / Dicky Lim Teik Kyee
Published 2018“…We propose an optimization algorithm designed by the interpolation of metaheuristics and mathematical programming techniques, known as MatHeuristics algorithm, to solve the model. …”
Get full text
Get full text
Get full text
Thesis -
11
Human face detection from color images: preliminary result
Published 2004“…A successful and robust algorithm should capable in identifying all facial region within a given images regardless of its position, orientation and lighting conditions. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The modelling results revealed that NARX algorithm is the best compared to the used algorithms in term of accuracy. …”
Get full text
Get full text
Get full text
Thesis -
16
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
17
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Analysis of Moderating Effect of Turnover Intention on the Relationship of Intrinsic Motivation and Employee Performance
Published 2024“…These findings provide valuable insights into how the dynamics of these variables interact under varying levels of turnover intention…”
Get full text
Get full text
Get full text
Article -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
