Search Results - (( basic using group algorithm ) OR ( java implementation phase algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- group algorithm »
- phase algorithm »
- basic using »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
Group consumers' preference recommendation algorithm model for online apparel's colour based on Kansei engineering
Published 2023“…Thus, this study took the colour design of men's plain-colour shirts as an example in China, established the basic colour calculation scale and an algorithm model of group consumers' product preferences based on Kansei Engineering and scientific mathematics, to provide new sales ideas and methods for retailers and markets online. …”
Get full text
Get full text
Get full text
Article -
4
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The genetic similarity algorithm is implemented in the Gene Ontology browser named basic UTMGO to overcome the weaknesses of the existing Gene Ontology browsers which use a conventional approach based on keyword matching. …”
Get full text
Get full text
Get full text
Article -
5
Basics of security and cryptography
Published 2014Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
7
A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance
Published 2011“…A set of basic sharing behaviors for a group of hexapod robots is first assigned. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
CSC099: Foundation Computing II / Centre of Foundation Studies
Published 2022“…In addition, a high quality of academic exercises such as individual assignment and group project will be used to achieve these aims. …”
Get full text
Get full text
Get full text
Teaching Resource -
9
Interval-valued fuzzy soft topology and its applications in group decision-making problems
Published 2022“…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
Get full text
Get full text
Thesis -
10
The online mastermind game / Cheong Kuen Leion
Published 2003“…This game shows the basic concept that is used in solving problems.…”
Get full text
Get full text
Thesis -
11
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Communication and computational cost on parallel algorithm of PDE elliptic type
Published 2009Get full text
Get full text
Book Section -
14
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. Clustering technique basically utilizes distance measure to define distance between various data points. …”
Get full text
Get full text
Get full text
Article -
15
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Secondly, the research shifts to the problems of point-to-multipoint algorithms by introducing the basic concept of multicasting ABR servIce and reviewing a group of consolidation schemes, where the compromise between low consolidation nOlse and fast transient response is the main issue. …”
Get full text
Get full text
Thesis -
16
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…Therefore, The paper presented a comparative analysis of IC-MFDs by collect various types of IC-MFDs and group them rely on their features used. Two groups, i.e. …”
Article -
17
-
18
Shepherding: An Immune-Inspired Robotics Approach
Published 2010“…The algorithm is applied on the Player/Stage simulation platform and evaluated using the sheepdog scenario. …”
Get full text
Get full text
Conference or Workshop Item -
19
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The CMS relies on the principle of grouping machines into machine cells and grouping machine parts into part families that is named cell formation. …”
Get full text
Get full text
Thesis -
20
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis
