Search Results - (( basic evaluation practices algorithm ) OR ( java implementation phase algorithm ))
Search alternatives:
- evaluation practices »
- implementation phase »
- java implementation »
- basic evaluation »
- phase algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
CSC562: Information Retrieval and Searching Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
4
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article -
5
A review of navigation systems (integration and algorithms)
Published 2009Get full text
Get full text
Get full text
Article -
6
Syllable-based Malay Word Stemmer
Published 2014“…The approach shows high practicality as it produces a very high accuracy in the evaluation.…”
Get full text
Get full text
Proceeding -
7
Performance optimization method in OFDM based on majorization and minimization technique
Published 2019“…In this paper, we demonstrate and simulate a practical algorithm to mitigate phase noise which induces ICI .This algorithm is termed as Tight Quadratic Majorization (TQM) and is derived for phase noise estimation. …”
Get full text
Get full text
Get full text
Article -
8
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. The proposed new algorithm was evaluated and the results indicate that it was practical in low bit rate environments targeted by H.263 as no negative speed gain was observed for the full range of step size during the evaluation. …”
Get full text
Get full text
Thesis -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
10
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…The developed localization framework is separately validated and evaluated each optimized step under various evaluation criteria, in terms of accuracy, stability, and cost, etc. …”
Get full text
Get full text
Thesis -
11
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
12
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…Afterward, these models were evaluated according to several well-known performance indices. …”
Get full text
Get full text
Article -
13
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…Afterward, these models were evaluated according to several well-known performance indices. …”
Get full text
Get full text
Article -
14
Mobile robot positioning system
Published 2008“…This component is build with complete circuit interface to a Parallax Basic Stamp (BS2) microcontroller module. Several motion control algorithm using BS2 software was develop to test the capabilities of system mobile motion in Y axis, X axis and other, particular attention is paid to evaluate the ability of the using Odometry to detect and correct positioning of the mobile platforms from 4 point. …”
Get full text
Learning Object -
15
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
17
Particle-based perception of garment folding for robotic manipulation purposes
Published 2023Article -
18
Transtheoretical model of change for weight control in Malaysian context
Published 2010“…The Stages of Change algorithm was able to classify the respondents into different Stages of Change to lose weight. …”
Get full text
Get full text
Get full text
Thesis -
19
Integrated artificial intelligence-based classification approach for prediction of acute coronary syndrome
Published 2014“…In the development of the “hybrid AI-based” classification models, the proposed model (K1-K2- NN), was basically introduced through combining AI approaches of modified K-NN, genetic algorithm (GA), Fisher’s discriminant ratio (FDR) and class separability criteria (CSC). …”
Get full text
Get full text
Get full text
Thesis
