Search Results - (( developing effective utilizing algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improving utility accrual scheduling algorithm for adaptive real-time system by Ahmad, Idawaty, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Othman, Muhammad Fauzan

    Published 2008
    “…Both of these algorithms are developed for adaptive real-time system environment where untoward effects such as deadline misses and overloads are tolerable. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem , Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2009
    “…And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
    Get full text
    Get full text
    Article
  5. 5

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2010
    “…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm by Nejad, Mohsen Fadaee

    Published 2013
    “…Multi-objective optimization of HRES by Evolutionary Algorithm have become attractive in recent years due to the effectiveness of such algorithms for complicated problems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm by Abdolrasol M.G.M., Ker P.J., Hannan M.A., Ayob A., Tiong S.K.

    Published 2024
    “…The developed BGD algorithm's effectiveness is further validated through a comparative analysis with conventional methods…”
    Conference Paper
  12. 12

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
    Get full text
    Get full text
    Thesis
  13. 13

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Moreover, the system must satisfy non-functional requirements like reliability, efficiency, performance, effective resource utilization, and scalability. Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Towards the utilization of normalized LMS algorithm in adaptive filter by Misbah Emhammed, Misbah Abdelsalam, Ho, Yih Hwa

    Published 2014
    “…In this paper, we focused on how the development of algorithms helped reduce the level of noise. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of task distribution algorithm for multi-robot coordination system by Sin, Han Bin

    Published 2022
    “…The problem always arises when robots are navigating such as the collision between robots and obstacles. Hence, an effective task distribution algorithm is important to allocate tasks correctly among the robots with optimum cost and time utilization. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Optimization Of Dynamic Transportation Task Assignment In A Manufacturing Facility by Tugiman, Muhammad Najib

    Published 2020
    “…A pattern toward multi-objectives approaches, developing facility layout software utilizing meta-heuristics, for example, simulated annealing (SA), genetic algorithm (GA), Anylogic Software and concurrent engineering to facility layout is observed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced location and positioning in wimax networks with virtual mimo base station by Othman, Muhammad Hakim

    Published 2015
    “…The developed algorithm includes the effect of the geometric dilution of precision (GDOP) to assist with the location estimation accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei by Yousef Ali, Mohammed Al-Gumaei

    Published 2017
    “…Numerical simulations are used to prove the effectiveness of these algorithms compared with other existing power control algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Steganography based on utilizing more surrounding pixels by Afrakhteh, Masoud

    Published 2010
    “…The effect of considering the rest of surrounding pixels on the performance of the developed model is studied and the effectiveness and shortcomings are highlighted. …”
    Get full text
    Get full text
    Thesis