Search Results - (( based constructive method algorithm ) OR ( program implementation a algorithm ))

Refine Results
  1. 1
  2. 2

    Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm by Chong, Kok Hen

    Published 2008
    “…Further more, a prototype hardware has been designed and constructed to test the success chromosome string, which called as GA based Logic Implementer (GALI). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…In order to develop a new algorithm for the course scheduling problem, this research follows the experimental research methodology that consist of problem analysis, designing algorithm, implementing algorithm as a computer program in order to examine the results, analyzing the results, and if necessary improving the algorithm by doing all those activities over and over again. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem by Bahri, Susila

    Published 2004
    “…Then the parallel algorithms are constructed and run using the Beowulf Cluster machine. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel Block Methods for Solving Ordinary Differential Equations by Abdul Majid, Zanariah

    Published 2004
    “…Subsequently, a more structured and efficient algorithm comprising the block methods was constructed for solving systems of first order ODEs using variable step size and order. …”
    Get full text
    Get full text
    Thesis
  7. 7

    The design and implementation of a two and three-dimensional triangular irregular network based GIS by Abdul Rahman, Alias

    Published 2000
    “…To facilitate the output of the developed methods and algorithms, software called TinSoft, which is a Windows-based Multiple Document Interface software was developed in this research.…”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…This thesis focussed on the development of PV module integrated with positive output (PO) buck-boost converter by intelligent control of MPPT technique. A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
    Get full text
    Get full text
    Thesis
  9. 9

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…This project, Extreme programming methodology was used to construct the flow of the project. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Feature clustering for pso-based feature construction on high-dimensional data by Swesi, Idheba Mohamad Ali Omer, Abu Bakar, Azuraliza

    Published 2019
    “…This paper proposes a cluster based PSO feature construction approach called ClusPSOFC. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Family of singly diagonally implicit block backward differentiation formulas for solving stiff ordinary differential equations by Saufianim, Jana Aksah

    Published 2021
    “…Since absolute stability is a crucial characteristic for a method to be useful therefore, stability graphs of the methods derived are constructed by MAPLE programming. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison Of Phylogenetic Trees Using Difference Distance Function Method by Maziah, Medin

    Published 2005
    “…This study is mainly about the construction of phylogenetic trees using for difference di stance functions methods. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Volunteer Management System by Muhammad Fazril Bin Mohd Amin, Muhammad Fazril

    Published 2012
    “…The project will adopt the Iterative and incremental development methodology, which promotes constant reevaluation, and will be built on the java programming language and developed on the Netbeans IDE, for the GUI and algorithm implementation. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Adaptive step size of diagonally implicit block backward differentiation formulas for solving first and second order stiff ordinary differential equations with applications by Mohd Ijam, Hazizah

    Published 2020
    “…These methods are implemented in diagonally implicit structure and generated the solutions of yn+1 and yn+2 simultaneously in a block. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
    Get full text
    Get full text
    Research Report
  18. 18

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of autonomous vehicle navigation algorithms using event-driven programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Ant system-based feature set partitioning algorithm for classifier ensemble construction by Abdullah, , Ku-Mahamud, Ku Ruhana

    Published 2016
    “…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
    Get full text
    Get full text
    Get full text
    Article