Search Results - (( developing effective function algorithm ) OR ( java operating system algorithm ))
Search alternatives:
- effective function »
- function algorithm »
- system algorithm »
- java »
- operating »
-
1
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results show the effectiveness of proposed MAS approaches for selecting the best DG location in a function of improved power system grounding and reliability. …”
Get full text
Get full text
Thesis -
2
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit scheduling is a key concept in computer multitasking, multiprocessing operating system and real‐ time operating system designs. …”
Get full text
Get full text
Thesis -
5
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…Fuzzy with bounded-addition operation has been introduced as a restriction in splicing systems to increase the generative power of the languages generated. …”
Get full text
Get full text
Article -
6
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
7
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Besides that, the system will build in Windows 2000 Professional Operating System. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. By taking the bus services in Universiti Teknologi MARA as sample, the research has used the genetic algorithm approach to solve the problem which is similar to the Travel Salesman Problem. …”
Get full text
Get full text
Thesis -
12
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
13
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
Get full text
Get full text
Thesis -
14
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. …”
Get full text
Get full text
Article -
15
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Android has been the most popular mobile operating system. Such popularity, however, also extends to attackers. …”
Get full text
Get full text
Get full text
Thesis -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Secure scheme for user authentication and authorization in android environment
Published 2013“…Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust…”
Get full text
Get full text
Get full text
Article -
18
-
19
Enhance foreign body image using partitioned iterated function system (PIFS) in image enhancement technique / Hidayah Sharif
Published 2010“…This application used one of the image enhancement techniques which his Partitioned Iterated Function System (PIFS) algorithm. Through the development of the application, the effectiveness of the result has been evaluated. …”
Get full text
Get full text
Thesis -
20
Estimation of the denitrification in the lower Mississippi Valley
Published 2001“…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
Get full text
Get full text
Conference or Workshop Item
