Search Results - (( basic computer support algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- support algorithm »
- computer support »
- java application »
- basic computer »
-
1
-
2
-
3
Unit Kesihatan UiTM (Perak) appointment scheduling system using Genetic Algorithm (GA) / Nur Amiera Abdul Rahman
Published 2014“…Alhamdulillah, my heartfelt thanks and gratitude to Allah SWT, that he was willing to give a chance with the good health and leisure time to complete this final year project proposal titled Unit Kesihatan UiTM (Perak) Appointment Scheduling System Using Genetic Algorithm (GA). The final year project has been properly drawn for Universiti Teknologi Mara (UiTM), basically for the students to complete the degree program leading to a Bachelor of Science (Hons) in Computer Science. …”
Get full text
Get full text
Thesis -
4
Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri
Published 2017“…The idea present in applicationbased regarding how computer game can effect player emotion to support other methodology in marketing sales known as “Emotion Level” to solve the problem. …”
Get full text
Get full text
Thesis -
5
Agent-based extraction algorithm for computational problem solving
Published 2015“…The agent-based model for CPS has been developed in JADE environment which applied the basic Believe, Desire and Intention (BDI) architecture to support multi-agent system environment. …”
Get full text
Get full text
Thesis -
6
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
7
-
8
-
9
DSC766: Text Analytics / College of Computing, Informatics and Mathematics
Published 2020“…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
Get full text
Get full text
Get full text
Teaching Resource -
10
Shot boundary detection based on orthogonal polynomial
Published 2019“…The outcomes of the comparative analysis show the superior performance of the proposed algorithm against other existing algorithms.…”
Get full text
Get full text
Get full text
Article -
11
Zero skew clock routing for fast clock tree generation
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
12
Robust correlation feature selection based support vector machine approach for high dimensional datasets
Published 2025“…The third step employs the support vector machine algorithm to calculate prediction values. …”
Get full text
Get full text
Get full text
Article -
13
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
Conference Paper -
15
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…The iterative search of shoot towards better light supported by the root counterparts leads to an optimization idea of TPO algorithm. …”
Get full text
Get full text
Article -
16
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…The iterative search of shoot towards better light supported by the root counterparts leads to an optimization idea of TPO algorithm. …”
Get full text
Get full text
Article -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
19
-
20
A flowchart-based multi-agent system for assisting novice programmers with problem solving activities
Published 2023“…The aim is to improve students' problem solving skills and to introduce them to the basic programming algorithms prior to surface structure, using an automatic text-to-flowchart conversion approach. …”
Article
