Search Results - (( developing development function algorithm ) OR ( service application design algorithm ))

Refine Results
  1. 1

    Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi by Mohammadhadi, Almasi

    Published 2015
    “…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
    Get full text
    Get full text
    Thesis
  2. 2

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…In this work, a new microcontroller board was designed and developed with Genetic Algorithm (GA) embedded on board. …”
    Conference paper
  3. 3

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The functionalities of existing systems across the members in the group are wrapped and introduce in the IIMA as services. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
    Get full text
    Get full text
    Thesis
  5. 5

    XML web services / Wong Kok Chuan by Wong, Kok Chuan

    Published 2003
    “…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Two machine learning model is chosen to build the classification models which are Random Forest (RF) algorithm and Multinomial Naïve Bayes (MNB) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael by Al-Bakri, S.H., Mat Kiah, M.L.

    Published 2010
    “…For implementation, a mobile information device application (MIDlet) has been developed in J2ME to introduce a required security services for SMS. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication by Ab Ghani, Mohd Ruddin, Wan Hassan, Wan Ahmas Redhauddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar

    Published 2013
    “…The results are then communicated between hardware circuit and simulation circuit for the final conclusion with the properly functional algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems by Nagrath, Vineet, Morel, Olivier, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Meriaudeau, Fabrice

    Published 2015
    “…Adaptation of cloud computing services for robotic applications is relatively straightforward while adaptation of underlying ideas will require a new design attitude. …”
    Get full text
    Get full text
    Article
  11. 11

    Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin by Hussin, Ain Amirah

    Published 2016
    “…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Halal restaurant finder / Khairol Azahar Ramli by Ramli, Khairol Azahar

    Published 2014
    “…The outcomes of the survey, most of the respondents are interested in Halal restaurant application and they are very satisfied with the function and interface design of Halal Restaurant Finder application. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…GSecaaS is quantitatively and qualitatively evaluated to determine the most appropriate security policies to the development of cloud security algorithm. Based on the evaluation of the post-survey, GSecaaS has been developed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    CYCLOSTATIONARY FEATURES OF PAL TV AND WIRELESS MICROPHONE FOR COGNITIVE RADIO APPLICATIONS by ALHASSAN MOSSA, ALFATEH MOHAMMED

    Published 2010
    “…In order to do so, we develop the co-existence scenario with three cases according to geographical positions of primary services and secondary service. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems by Adnan, Mohd Hirzi, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala K.

    Published 2025
    “…At the same time, adaptive parameters allow flexible trade-offs between service quality and risk tolerance. Meanwhile, task scheduling is optimized using a greedy algorithm to reduce computational complexity, and UAVs cooperate through information sharing to achieve robust performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A realtime Runner Help Me mobile application using geolocation technique / Nurul Amierah Abd Rahman by Abd Rahman, Nurul Amierah

    Published 2019
    “…The objective of the system is to identify the user requirements of Runner Help Me mobilebased application system. Next, to design and develop a Runner Help Me mobile-based application system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…The operating system frequency is set to 40 MHz. A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Secured HF image transmission system by Shameri, Ahmad Zuri

    Published 2006
    “…For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR) and a nonlinear combining function. …”
    Get full text
    Get full text
    Monograph