Search Results - (( developing building function algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- function algorithm »
- building function »
- validation using »
- java validation »
- using algorithm »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
Enhanced multi-objective evolutionary mating algorithm with improved crowding distance and levy flight for optimizing comfort index and energy consumption in smart buildings
Published 2025“…It contributing to the broader fields of building automation and sustainable development while aligning with Industry 4.0 initiatives.…”
Get full text
Get full text
Get full text
Article -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
5
-
6
Building Fuzzy Inference Systems with Similarity Reasoning: NSGA II-based Fuzzy Rule Selection and Evidential Functions
Published 2014“…Besides that, two new evidential functions are developed, whereby given fuzzy rules are considered as evidence. …”
Get full text
Get full text
Proceeding -
7
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…This study develops a flexible, comprehensive and accurate microcomputer-based building energy analysis package. …”
Get full text
Get full text
Thesis -
9
Exploration of educational building with cultural elements using shape grammar
Published 2013“…Basic building blocks for Western, Chinese, European and Malay culture are developed to construct the educational buildings. …”
Get full text
Get full text
Undergraduates Project Papers -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Development of a new method of crack modeling and prediction algorithm
Published 2008Get full text
Get full text
Proceeding Paper -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
13
Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail
Published 2021“…The algorithm used to develop a product recommendation engine is collaborative filtering algorithm and this algorithm is written in python. …”
Get full text
Get full text
Thesis -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
15
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019“…This model will demonstrate the capability to handle the knowledge of human being and uncertain information in evaluating the wellness of chronic kidney disease (CKD) patients. This proposed algorithm could support to improve the overall health of CKD patients through a variety of indicators such as physical functioning, mental health, vitality, and social functioning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…An Intelligent Learning System for the turning process was developed. Visual C++ object-oriented programming language was used to build the Intelligent Learning System for Turning. …”
Get full text
Get full text
Thesis -
17
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
Get full text
Get full text
Thesis -
18
Using laguerre functions to improve the tuning and performance of predictive functional control
Published 2019“…This paper proposes a novel modification to the predictive functional control (PFC) algorithm to facilitate significant improvements in the tuning efficacy. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Stock price monitoring system
Published 2024“…As stock price is time series data, a time series prediction algorithm is being utilized to build a deep learning model, namely Long Short-Term Memory (LSTM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
