Search Results - (( developing formative efficient algorithm ) OR ( java equations using algorithm ))

Refine Results
  1. 1

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…In addition, one of the main challenges has been development of efficient algorithm for solving aforementioned model to find exact feasible optimal solution. …”
    Get full text
    Get full text
    Thesis
  2. 2

    BASE: a bacteria foraging algorithm for cell formation with sequence data by Nouri, Hossein, Tang, Sai Hong, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2010
    “…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations by Nouri, Hossein, Tang, Sai Hong

    Published 2013
    “…This paper investigates the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem. In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
    Get full text
    Get full text
    Article
  4. 4

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…This optimizes data transmission, enhances energy efficiency, and extends network longevity. The ACO algorithm integrates multiple criteria, ensuring routes are short and energy-efficient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman by Abdul Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  8. 8

    The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman by Abd Rahman, Hayati

    Published 2006
    “…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat by Selamat, Noor Saedah

    Published 1996
    “…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…Thus, to develop an efficient scheme to generate non fixed iteration in the image scrambling algorithm in order to eliminate the problem of visual leakage. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…One of the main challenge in the design of the Wireless ATM network resides in the formation of the Wireless MAC protocol, that could handle various services with a considerable QoS and providing efficient utilization of the Wireless Channel. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Guidance and control for satellite in-orbit-self-assembly proximity operations by Okasha, Mohamed Elsayed Aly Abd Elaziz, Park, Chandeok, Park, Sang-Young

    Published 2015
    “…Numerical nonlinear simulations that illustrate the performance and accuracy of the proposed algorithms are performed in a cubic formation assembly.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of least square adjustment application for traversing / Harith Fadhillah Soeb by Soeb, Harith Fadhillah

    Published 2019
    “…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis