Search Results - (( code application interface algorithm ) OR ( java application swarm algorithm ))
Search alternatives:
- application swarm »
- code application »
- java application »
- swarm algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
2
Automatic marking system for programming subject
Published 2023“…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
4
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
-
9
Development of finite element model for soil-structure interaction
Published 2014“…In general, application of interface element can well highlight the influence of soil behavior and its consequent effects on the superstructure. …”
Get full text
Get full text
Thesis -
10
-
11
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
12
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Monograph -
13
-
14
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
15
Nonlinear three-dimensional finite elements for composite concrete beams
Published 2012“…The development and application of the interface element to model the interface behaviour between concrete and FRP are still very limited. …”
Get full text
Get full text
Thesis -
16
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…The further improvements can be made through lighting design, adding image enhancement algorithm and decision algorithm. Hence, deep understanding of vision system work flow will be obtained thus enhancing advanced sensory application.…”
Get full text
Get full text
Thesis -
17
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019Get full text
Get full text
Final Year Project -
18
Parallelization Of CCSDS Hyperspectral Image Compression Using C++
Published 2018“…In this research, the aim is to design a parallelization algorithm on CCSDS-MHC using Open Multi-Processing (OpenMP), an open-source C++ application programming interface (API). …”
Get full text
Get full text
Monograph -
19
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
Published 2021“…However, a common limitation of these tools is the low code coverage because of the tools' inability to find the right combination of actions that can drive the application into new and important states. …”
Get full text
Get full text
Get full text
Thesis -
20
