Search Results - (( variable representation using algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Switching algorithm to avoid attitude representation singularity by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2009
    “…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    A review of crossover methods and problem representation of genetic algorithm in recent engineering applications by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2020
    “…This paper reviews crossover methods and problem representation, e.g. in the form of binary coded and real coded representation, used by researchers in order to solve engineering operations. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Switching principles to circumvent Euler angle singularity by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2010
    “…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Three algorithms were used to accomplish the task of feature representation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition by Ali Yahya, Anwar

    Published 2007
    “…In the selection phase, a new variable length genetic algorithm is applied to select the lexical cues. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A Comparative Study Of Fuzzy C-Means And K-Means Clustering Techniques by Sharifah Sakinah, Syed Ahmad

    Published 2014
    “…Then, we apply six datasets to measure the quality of clustering result based on the similarity measure used in the algorithm and its representation of clustering result. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…The solution obtained from the LB–MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB–NLP. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan , Yin Keong

    Published 2009
    “…The solution obtained from the LB-MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB-NLP. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector by Popoola, Oluwatoyin Muse Johnson

    Published 2014
    “…The ten out of fifteen hypotheses were tested through the use of PLS-SEM algorithm and bootstrap techniques on the hypothesized relationships while the remaining five hypotheses of differences among groups were tested using the Mann-Whitney U Test. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact by Matori, A.N, Hassaballa, A. Haleem

    Published 2011
    “…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
    Get full text
    Get full text
    Article
  19. 19

    Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan by Ahmat Ruslan, Fazlina

    Published 2015
    “…Comparison results have shown that the pre-screening method has an essential role in determining an effective process representation especially in real-time multivariable identification framework where a priori knowledge is not available and would help in resultant model generalization performance as opposed to simply using all available model input variables. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam by Rustam, Ilham

    Published 2015
    “…Comparison results have shown that the pre-screening method has an essential role in determining an effective process representation especially in real-time multivariable identification framework where a priori knowledge is not available and would help in resultant model generalization performance as opposed to simply using all available model input variables. …”
    Get full text
    Get full text
    Thesis