Search Results - (( developing formative integration algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- formative integration »
- integration algorithm »
- developing formative »
- java application »
-
1
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
3
-
4
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
5
Optimisation of fed-batch fermentation process using deep reinforcement learning
Published 2023“…At the same time, the total ethanol formation is 0.19 g/l and 0.03 g/l lower than the exponential feeding and genetic algorithm, respectively. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of an integrated model for production planning and cell formation in cellular manufacturing systems
Published 2010“…However, only a few studies explicitly and simultaneously incorporate the CMS context, production planning and cell formation problem. In this thesis, a mathematical programming model is developed using an integrated approach for production planning and CF problems in a CMS. …”
Get full text
Get full text
Thesis -
7
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis -
8
The use of the Bayesian approach in the formation of the student's competence in the ICT direction
Published 2019“…The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
Get full text
Get full text
Conference or Workshop Item -
9
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…This optimizes data transmission, enhances energy efficiency, and extends network longevity. The ACO algorithm integrates multiple criteria, ensuring routes are short and energy-efficient. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Registration and billing system
Published 2005“…To over come these problems,a Registration and Billing System Prototype have been developed.The format of the system prototype is a web-based application.The purpose of this development is to solve the existing problems found in the existing system.A software development process called Rapid Software Development Life Cycle(RSDLC) has been used to develop this system prototype.The purpose of using this software development process is to shorten the time for the software development process.The tools of the software development are Macromedia Dreamweaver MX 6.0; the JSP web dynamic programming language and Oracle 9i as the system database.The Registration and Billing System Prototype uses an integrated system database to store the patient data. …”
Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
14
Constraint preserving mapping algorithm for XML storage
Published 2006“…The use of XML as the common format for representing, exchanging, storing, integrating and accessing data poses many new challenges to database systems. …”
Get full text
Get full text
Conference or Workshop Item -
15
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…Furthermore, discussion about the hardware methods of implementing communication protocols shows a way for the engineer to choose the right method for his future development of the protocols for implementation. Finally, this algorithmic approach is proposed to integrate this approach to simulate the methodology of IP to WATM conversion.…”
Get full text
Get full text
Thesis -
16
-
17
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…One of the principal challenges in integrating databases is duplication. In other words, in different databases, one entity may be available in different formats. …”
Get full text
Thesis -
18
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
19
Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement
Published 2025“…The proposed algorithmic refinements integrate chromatic and morphological attributes, particularly surface area and optimise logical operators to enhance accuracy. …”
Get full text
Get full text
Get full text
Article -
20
Prevention of Textual Plagiarism Application
Published 2011“…This form of plagiarism can be categorized as a form of direct stealing without proper acknowledgment and consent of another's work. Rabin - Karp Algorithm which is a string searching algorithm that uses hashing to compare the strings will be integrated in this project as well. …”
Get full text
Get full text
Final Year Project
