Search Results - (( basic generation x algorithm ) OR ( java implementation phase algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- basic generation »
- phase algorithm »
- generation x »
- x algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
-
3
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
4
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…A dataset of APKs was generated from seven X-ray APKs, which consisted of 3 internal domains, using the reliable docking tool ZDOCK. …”
Get full text
Get full text
Article -
5
-
6
-
7
-
8
-
9
Penggunaan penggugusan subtraktif bagi menjana peraturan kabur
Published 2005“…Based on the study, it is found that the system was able to generate 8 cluster center at on 30(3x10) data value at 0.3 cluster radius and also able to generate 4 cluster center at 0.5 radius with average MSE of 0.005…”
Get full text
Get full text
Article -
10
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Determination of power flow and loss allocation using superposition theory method
Published 2011Get full text
Article -
14
-
15
Penggunaan penggugusan subtraktif bagi menjana peraturan kabur
Published 2005“…Based on this study, it is found that the system was able to generate 8 cluster center on 30 (3 x 10) data value at 0.3 cluster radius and also able to generate 4 cluster center at 0.5 radit.rs with average MSE of 0.005). …”
Get full text
Get full text
Get full text
Article -
16
Transcriptomic Study of Gracilaria Changii (Gracilariales, Rhodophyta) By Expressed Sequence Tags and Cdna Microarray Approach
Published 2009“…The putative identity of TUGs was identified by using Basic Local Alignment Search Tool X (BLASTX) algorithm and classified according to the functional groups in Kyoto Encyclopedia of Genes and Genomes (KEGG). …”
Get full text
Get full text
Thesis -
17
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…The online business of Company X is running normally as usual, until a day before mother’s day, the webpage of Company X is totally down and the prospective customers could not open the webpage to make order to be sent specially for their beloved mother. …”
Get full text
Get full text
Thesis
