Search Results - (( developing formative efficiency algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing formative »
- formative efficiency »
- efficiency algorithm »
- validation using »
- java validation »
- using algorithm »
-
1
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…In addition, one of the main challenges has been development of efficient algorithm for solving aforementioned model to find exact feasible optimal solution. …”
Get full text
Get full text
Thesis -
2
BASE: a bacteria foraging algorithm for cell formation with sequence data
Published 2010“…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
Get full text
Get full text
Get full text
Article -
3
Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations
Published 2013“…This paper investigates the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem. In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
Get full text
Get full text
Article -
4
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…This optimizes data transmission, enhances energy efficiency, and extends network longevity. The ACO algorithm integrates multiple criteria, ensuring routes are short and energy-efficient. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
8
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
10
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
11
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
12
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
Get full text
Get full text
Thesis -
13
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
15
-
16
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Thus, to develop an efficient scheme to generate non fixed iteration in the image scrambling algorithm in order to eliminate the problem of visual leakage. …”
Get full text
Get full text
Get full text
Article -
17
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
18
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
19
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
20
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…One of the main challenge in the design of the Wireless ATM network resides in the formation of the Wireless MAC protocol, that could handle various services with a considerable QoS and providing efficient utilization of the Wireless Channel. …”
Get full text
Get full text
Thesis
