Search Results - (( java application customization algorithm ) OR ( based verification mining algorithm ))
Search alternatives:
- customization algorithm »
- verification mining »
- based verification »
- java application »
- mining algorithm »
-
1
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
2
Development and implementation of a technique for norms-adaptable agents in open multi-agent communities
Published 2023“…Computer science; Systems science; Agent based simulation; Mining algorithms; Multi-agent community; nocv1; Normative agents; norms deatetcin; Norms detections; Third parties; Verification process; Multi agent systems…”
Article -
3
Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The validation and verification of the proposed architecture were performed using High-Level Petri Nets (HLPN) and Z3 Solver. …”
Get full text
Get full text
Get full text
Thesis -
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
