Search Results - (( its relations using algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- relations using »
- using algorithm »
- its relations »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…Approach: In this study we present an algorithm for generating an optimal design for XML in relational setting. …”
Get full text
Get full text
Journal -
4
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…These values can be benchmarked in solving multi-objective GMS problems using the multi-objective PACS algorithm and its variants.…”
Get full text
Get full text
Get full text
Article -
5
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
6
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…The fourth and fifth algorithms, Concept Feature Vector_Text Classification (CFV_TC) and Structure Feature Vector_Text Classification (SFV_TC) classify the document to its related set of classes. …”
Get full text
Get full text
Get full text
Thesis -
7
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
Get full text
Get full text
Thesis -
8
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
Get full text
Get full text
Get full text
Thesis -
9
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…Although programming in such environment is relatively harder compared to that of in shared memory multiprocessing environment, its advantages outweigh its complexity. …”
Get full text
Get full text
Get full text
Article -
10
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION
Published 2024“…The Sine Cosine Algorithm (SCA) is a relatively recent metaheuristic algorithm, drawing inspiration from the characteristics of trigonometric sine and cosine functions. …”
Get full text
Get full text
Get full text
Book Chapter -
13
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
Get full text
Get full text
Thesis -
14
Constraint preserving mapping algorithm for XML storage
Published 2006“…Most of application data are stored in relational databases due to its popularity and rich development experiences over it. …”
Get full text
Get full text
Conference or Workshop Item -
15
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010Get full text
Get full text
Conference or Workshop Item -
16
Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy
Published 2020“…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of symbolic algorithms for certain algebraic processes
Published 2007“…With the bound of the true solution not known a priori, the test is devised and carefully incorporated into the modular algorithm. The results illustrate that the modular algorithm illustrate its best performance for the class of relatively prime polynomials. …”
Get full text
Get full text
Get full text
Monograph -
18
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
Get full text
Get full text
Student Project -
19
Development of symbolic algorithms for certain algebraic processes
Published 2007“…With the bound of the true solution not known a priori, the test is devised and carefully incorporated into the modular algorithm. The results illustrate that the modular algorithm illustrate its best performance for the class of relatively prime polynomials. …”
Get full text
Get full text
Get full text
Monograph -
20
Evaluation of feature selection algorithm for android malware detection
Published 2018“…Proposed algorithm applied considers the feature based on its level of importance. …”
Get full text
Article
