Search Results - (( developing agent program algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Synthesizing agent for Wumpus World / Ainul Azlinda Abu Bakar by Abu Bakar, Ainul Azlinda

    Published 2004
    “…The developing of intelligent agent has become a major research for many researchers currently. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Recent research in cooperative path planning algorithms for multi-agent using mixed- integer linear programming by Che Ku, Nor Azie Hailma, Omar, Rosli, Sabudin Elia Nadira, Sabudin Elia Nadira

    Published 2016
    “…Path planning is one of the issues to be handled in the development of autonomous systems. For a group of agents, cooperative path planning is crucial to ensure that a given mission is accomplished in the shortest time possible with optimal solution. …”
    Get full text
    Get full text
    Article
  5. 5

    Solving Unit Commitment Problem Using Multi-agent Evolutionary Programming Incorporating Priority List by Othman M.N.C., Rahman T.K.A., Mokhlis H., Aman M.M.

    Published 2023
    “…This paper presents an approach to solve the unit commitment problem using a newly developed Multi-agent Evolutionary Programming incorporating Priority List optimisation technique (MAEP-PL). …”
    Article
  6. 6

    Modeling of static and dynamic components of bio-nanorobotic systems by Gavgani, Hamidreza Khataee

    Published 2012
    “…Moreover, agent-based behavioral models of the nanomotors are developed using state machine diagrams of UML to illustrate the internal autonomous and intelligent decision-making processes of the nanomotors. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman by Che Othman, Muhammad Nazree

    Published 2013
    “…This research presents an approach to solve the UC problem using a newly developed Multi-agent Evolutionary Programming incorporating Priority Listing optimisation technique (MAEP-PL). …”
    Get full text
    Get full text
    Thesis
  8. 8

    A flowchart-based multi-agent system for assisting novice programmers with problem solving activities by Hooshyar D., Ahmad R.B., Raj R.G., Nizam M.H.N.M., Yousefi M., Horng S.-J., Rugelj J.

    Published 2023
    “…In order to address this problem, FMAS, a flowchart-based multi-agent system is developed to familiarize students who have no prior knowledge of programming, with the initial stages in learning programming. …”
    Article
  9. 9

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…This issues can solved by programming the Congkak system based on previous work on Mancala and NN system, and then recording the performance of the related algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Box-jenkins and genetic algorithm hybrid model for electricity forecasting system by Mahpol, Khairil Asmani

    Published 2005
    “…Energy is considered a prime agent in the generation of wealth and also a significant factor in economic development. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14
  15. 15
  16. 16
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…Modelling is a method of solving problems that can be replaced by a simple object that describes the real system with its behaviour. A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Human evacuation movement simulation model: Concepts and techniques by Noor Akma, Abu Bakar, Lim, Siew Mooi, Abdul Majid, Mazlina

    Published 2022
    “…Modelling is a method of solving problems that can be replaced by a simple object that describes the real system with its behaviour. A program with a running algorithm of a computer model is called a computer simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis