Search Results - (( construct evaluation system algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    A tool for addressing construct identity in literature reviews and meta-analyses by Larsen, Kai Rune T., Bong, Chih How

    Published 2016
    “…We designed and evaluated the construct identity detector (CID), the first tool with large-scale construct identity detection properties and the first tool that does not require respondent data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Invigilation timetabling system using genetic algorithm (GA) / Shahirah Mohamed Hatim by Shahirah, Mohamed Hatim

    Published 2011
    “…This system is developed for the invigilators and with the objective of constructing an invigilation timetable using Genetic Algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fast and optimal tuning of fractional order PID controller for AVR system based on memorizable-smoothed functional algorithm by Ren Hao, Mok, Ahmad, Mohd Ashraf

    Published 2022
    “…Therefore, this study proposes a modified smoothed function algorithm (MSFA) based method to tune the FOPID controller of AVR system since it requires fewer number of function evaluation per iteration. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment by Hasnira, Md. Lazim

    Published 2004
    “…The methodology and testing procedure which are used during this evaluation is based on a simulation model. Result from the evaluation set constructed is found able to show the performance of the cryptography system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…For this project, there are two types of testing were conducted: functionality testing of the performance of the entire system and metric evaluation to evaluate the accuracy of the object detection model. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid BLEU Algorithm For Structured Exam Management System by Zulhana, Zulkifle

    Published 2008
    “…This system incorporate algorithm BLEU into the expert system to check the answer and evaluate marks for every assessment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Supplier selection for contractors using Fuzzy TOPSIS Algorithm / Mohamed Shafiq Mohamed Yusof by Mohamed Yusof, Mohamed Shafiq

    Published 2020
    “…The evaluation process of the system is done by functionality test by several experts and contractors. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…The ability to construct accurate mathematical models of real systems is an important part of the control parameters in prototype PEM fuel cell systems for vehicles. …”
    Get full text
    Get full text
    Book Section
  12. 12

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Enhancement Of Wifi Indoor Positioning System by Aboodi, Ahed Hussein

    Published 2011
    “…The proposed algorithm has achieved an average accuracy of 2:6m for maximum mobility move- ment speed of 0:80m=s, and has been evaluated against other two trilateration algorithms (LSA Corrected and LSA No Correction) which have archived the average accuracy of 34:32m and 218:35m respectively.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun by Wan Harun, Wan Muhammad Aqil

    Published 2016
    “…The developed proposed system is named Colosseum Tournament Management System (CTMS). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai by Fauzai, Norisyani

    Published 2021
    “…The second objective is to develop a system to construct the exam hall allocation using a genetic algorithm and the last objective is to evaluate the functionality of the exam hall allocation system. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…Previously, replica placement has not been an issue since the research only focuses on small-scale systems. However, in a larger system such as Data Grid, the existing replica control protocols require bigger number of replicas to construct read and write quorums. …”
    Get full text
    Get full text
    Thesis