Search Results - (( developing consumer connection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…This study presents the development of Dolphin Echolocation Algorithm (DEA)-based sizing algorithm for sizing optimization of large-scale GCPV systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Shortest Path Trajectory System Based on Dijkstra Algorithm by Putri, Indah Pratiwi

    Published 2012
    “…This project includes the modification of main algorithm which has been implemented in the prototype development. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…Internet provides almost unlimited connection nowadays and it is widely used in our daily life such as in industrial, IoT and consumer applications. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…The proposed algorithm can be divided into three stages. The first stage is parameter setup and pre-processing. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…Developing an exploration algorithm based on spanning tree is the main contribution. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient terrain coverage for deploying wireless sensor nodes on multi-robot system by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2016
    “…Developing an exploration algorithm based on spanning tree is the main contribution and this exploration algorithm is performing fast localization of sensor nodes in energy efficient manner. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Computational performance of artificial immune system-based sizing technique for grid-connected photovoltaic system / Ismail Musirin … [et al.] by Musirin, Ismail, Sulaiman, Shahril Irwan, Abdul Rahman, Titik Khawa, Shaari, Sulaiman, Omar, Ahmad Maliki, Othman, Muhammad Murthada, Muhammad, Khairul Safuan

    Published 2012
    “…As these conventional sizing techniques are tedious and time-consuming, an Artificial Immune System (AIS)- based sizing algorithm is proposed to improve the conventional sizing technique by improving the computation time and the flexibility of the design process. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Vertical Handover Decision Processes for Fourth Generation Heterogeneous Wireless Networks by Al-Khalid, Hj Othman, Mahmood, Adnan, Hushairi, Zen

    Published 2013
    “…The increased growth in consumer demand for seamless access to communication services anywhere and anytime is inevitably driving an accelerated technological development towards the integration of an assortment of wireless network technologies – nowadays referred to as ‘Fourth Generation (4G) Wireless Systems’. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…Credit scoring is an evaluation of the risk connected with lending to clients (consumers) or an organization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Bacteria identification via Artificial Neural Network based-on Bergey’s manual by Ruhaimi, Amirul Hafiiz

    Published 2017
    “…Levenberg Marquardt algorithm based Feed-forward backpropagation with Multilayer perceptron type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results within short period of time.…”
    Get full text
    Get full text
    Student Project
  15. 15

    Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.] by Selvarajoo, Mathuri, Santono, Mohd Pawiro, Fong, Wan Heng, Sarmin, Nor Haniza

    Published 2023
    “…An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
    Get full text
    Get full text
    Article
  16. 16

    Development Of An Intelligent Water Blending System For Irrigation Of Crops With Various Salinity Tolerance And Aquaculture by Abdullah Al-Jughaiman, Abdullah Sulaiman

    Published 2008
    “…A mathematical model for water blending was developed to simulate mixing water in a network of tanks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Internet access using encrypted membercard / Muhammad Syafiq Sopian by Sopian, Muhammad Syafiq

    Published 2021
    “…It brings many disbenefit to the user in term of time consuming, security and availability of equipment. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
    text::Thesis
  19. 19

    Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency by Bello, AbdulKarim, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Zulzalil, Hazura

    Published 2018
    “…Regression testing performed to provide confidence on the newly or updated software system is a resource consuming process. To ease this process, various techniques are developed. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Application of artificial neural network in bacteria identification based on Bergey’s manual: Hydrogenophilaceae family: article by Ruhaimi, Amirul Hafiiz, Ahmad, Normadyzah, Husin, Hazlina, Mohamad Pauzi, Syazana

    Published 2017
    “…Levenberg Marquardt algorithm based Feedforward backpropagation with Multilayer perceptrons type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results. within short period time.…”
    Get full text
    Get full text
    Article