Search Results - (( basic optimisation system algorithm ) OR ( based applications interface algorithm ))
Search alternatives:
- applications interface »
- optimisation system »
- basic optimisation »
- based applications »
- system algorithm »
-
1
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…This work aims to optimise the tool path by simulating the removal of material in a finite element environment, which is controlled by a Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
2
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…This work was carried out with the aim to optimise the tool path by simulating the removal of material in a finite element environment which is controlled by a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Article -
3
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
4
Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman
Published 2013“…The developed technique was tested on the 10 generating units test system then up to 20 generating units in a 24-hours scheduling period and the results was compared with the basic EP, Evolutionary Programming with Priority Listing (EP-PL) and Multi-agent Evolutionary Programming (MAEP) optimisation techniques. …”
Get full text
Get full text
Thesis -
5
Brain Machine Interface Controlled Robot Chair
Published 2010“…A particle swarm optimization based algorithm is proposed to train the neural networks. …”
Get full text
Thesis -
6
Development of real-time software interface for multicomponent transient signal analysis using Labview and Matlab
Published 2011“…Though, a Matlab-based algorithm has been developed in the previous study on multicomponent signal analysis, real-time signal analysis is required in many practical applications of such signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
8
-
9
-
10
A primary interface selection policy in heterogeneous networks based on QoS
Published 2012“…This paper proposes a policy that determines different applications’ requirements and chooses an appropriate interface as a primary interface for respective application based on the networks condition to improve Quality-of-Service (QoS). …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Application of Artificial Immune Algorithm (AIA) in solving engineering problems
Published 2023“…The outline of this project design two Graphical User Interfaces (GUI) that can solve two engineering problems based on Artificial Immune Algorithm.…”
text::Final Year Project -
12
Application of Artificial Immune Algorithm (AIA) in solving engineering problems
Published 2023“…The outline of this project is design two Graphical User Interfaces (GUI) that can solve two engineering problems based on Artificial Immune Algorithm.…”
text::Final Year Project -
13
-
14
PIC-Based Controller for IGBT Inverter for 3-Phase Motor Drive
Published 2011“…The controller, based on Microchip PIC, needs to be programmed with the commutation algorithm and control strategy.…”
Get full text
Get full text
Final Year Project -
15
Automatic email classification system / Phang Siew Ting
Published 2003Get full text
Get full text
Thesis -
16
-
17
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Subjects: Get full text
Get full text
Thesis -
18
-
19
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
20
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article
