Search Results - (( developing development function algorithm ) OR ( service application design algorithm ))
Search alternatives:
- development function »
- service application »
- function algorithm »
- application design »
- design algorithm »
-
1
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
2
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…In this work, a new microcontroller board was designed and developed with Genetic Algorithm (GA) embedded on board. …”
Conference paper -
3
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…The functionalities of existing systems across the members in the group are wrapped and introduce in the IIMA as services. …”
Get full text
Get full text
Get full text
Article -
4
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
Get full text
Get full text
Thesis -
5
XML web services / Wong Kok Chuan
Published 2003“…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
Get full text
Get full text
Thesis -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
7
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
Get full text
Get full text
Get full text
Article -
8
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…For implementation, a mobile information device application (MIDlet) has been developed in J2ME to introduce a required security services for SMS. …”
Get full text
Get full text
Get full text
Article -
9
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…The results are then communicated between hardware circuit and simulation circuit for the final conclusion with the properly functional algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…Adaptation of cloud computing services for robotic applications is relatively straightforward while adaptation of underlying ideas will require a new design attitude. …”
Get full text
Get full text
Article -
11
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
Get full text
Get full text
Thesis -
12
-
13
Halal restaurant finder / Khairol Azahar Ramli
Published 2014“…The outcomes of the survey, most of the respondents are interested in Halal restaurant application and they are very satisfied with the function and interface design of Halal Restaurant Finder application. …”
Get full text
Get full text
Thesis -
14
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. …”
Get full text
Get full text
Thesis -
15
CYCLOSTATIONARY FEATURES OF PAL TV AND WIRELESS MICROPHONE FOR COGNITIVE RADIO APPLICATIONS
Published 2010“…In order to do so, we develop the co-existence scenario with three cases according to geographical positions of primary services and secondary service. …”
Get full text
Get full text
Thesis -
16
Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems
Published 2025“…At the same time, adaptive parameters allow flexible trade-offs between service quality and risk tolerance. Meanwhile, task scheduling is optimized using a greedy algorithm to reduce computational complexity, and UAVs cooperate through information sharing to achieve robust performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Overview of Evolutionary Algorithms and Neural Networks for Modern Mobile Communication
Published 2024journal::journal article -
18
A realtime Runner Help Me mobile application using geolocation technique / Nurul Amierah Abd Rahman
Published 2019“…The objective of the system is to identify the user requirements of Runner Help Me mobilebased application system. Next, to design and develop a Runner Help Me mobile-based application system. …”
Get full text
Get full text
Thesis -
19
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…The operating system frequency is set to 40 MHz. A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
Get full text
Get full text
Get full text
Article -
20
Secured HF image transmission system
Published 2006“…For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR) and a nonlinear combining function. …”
Get full text
Get full text
Monograph
