Search Results - (( some applications out algorithm ) OR ( web application solar algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…The purpose of this paper is to shed light on some algorithms in the literature on density-based clustering over data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…This system is used an rule base algorithm to get an output. The result of this system is come out with the prototype system that adapts the rule base algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic by Sa'ad, Suleiman, Abdullah, Muhammed, Abdullah, Azizol, Ayob, Fahrul Hakim

    Published 2022
    “…This paper proposes to investigate symbiotic organisms search algorithms used in handling various optimisation problems in different fields to bring out strengths and weaknesses of the existing algorithms as well as to point out future directions for the upcoming studies in the domain. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem by Odili, Julius Beneoluchi, Noraziah, Ahmad, Zarina, M.

    Published 2021
    “…This is quite disturbing because most real-life applications are actually asymmetric in nature. These six algorithms were chosen for their performance comparison because they have posted some of the best results in literature and they employ different search schemes in attempting solutions to the ATSP. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…In addition, the proposed detection model will be able to generate the report regarding the level of vulnerability of the web application. The research will be carried out by using design string matching algorithm. …”
    Get full text
    Get full text
    Research Reports
  18. 18
  19. 19

    Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi by Seyedmehdi, Mirmohammadsadeghi

    Published 2015
    “…Here, firstly, two experimental tests have been carried out to show the validity and consistency of the applied algorithms for solving TTRPSDTW. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20