Search Results - (( develop soft selection algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Application of a preference relationship in decision-making based on intuitionistic fuzzy soft sets by Kilicman, Adem, Khameneh, Azadeh Zahedi, Salleh, Abdul Razak

    Published 2018
    “…Until now, different researchers have designed different algorithms for ranking objects in order to select the best option in group decision-making problems under intuitionistic fuzzy soft environment. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…Further more, an improved non-dominated sorting genetic algorithm with an elite strategy II (IMNSGA-II) has been developed to solve the two bi-objective models, surpassing existing literature’s algorithms such as Pareto Envelope-based Selection Algorithm II (PESA-II) and NSGA-II. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…Three algorithms of Linear (PURELIN), hyperbolic tangent sigmoid (TANSIG) and logistic sigmoid (LOGSIG) activation functions were selected for output layer. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
    Get full text
    Get full text
    Research Reports
  7. 7
  8. 8

    An adjustable approach to multi-criteria group decision-making based on a preference relationship under fuzzy soft information by Khameneh, Azadeh Zahedi, Kilicman, Adem, Salleh, Abdul Razak

    Published 2017
    “…To date, different algorithms have been proposed for solving collective decision-making problems based on fuzzy soft set theory. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Soft redundant instrument for metering station in gas transportation system by Rosli, N.S., Ibrahim, R., Ismail, I.

    Published 2015
    “…This study focuses on the development of a soft redundant instrument to replace secondary hard instrument for saving cost of installation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Soft redundant instrument for metering station in gas transportation system by Rosli, N.S., Ibrahim, R., Ismail, I.

    Published 2015
    “…This study focuses on the development of a soft redundant instrument to replace secondary hard instrument for saving cost of installation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  17. 17

    FTMSK invigilation timetabling system (FITS) / Abdul Halim Mat Noh by Mat Noh, Abdul Halim

    Published 2005
    “…The fitness chromosome is definitely the optimal solutions that later will develop the invigilation timetable. Finally, a system called FITS is presented to develop the invigilation timetable.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20