Search Results - (( developing formative integration algorithm ) OR ( java implication bat algorithm ))

Refine Results
  1. 1
  2. 2

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimisation of fed-batch fermentation process using deep reinforcement learning by Chai, Wan Ying

    Published 2023
    “…At the same time, the total ethanol formation is 0.19 g/l and 0.03 g/l lower than the exponential feeding and genetic algorithm, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an integrated model for production planning and cell formation in cellular manufacturing systems by Raminfar, Reza

    Published 2010
    “…However, only a few studies explicitly and simultaneously incorporate the CMS context, production planning and cell formation problem. In this thesis, a mathematical programming model is developed using an integrated approach for production planning and CF problems in a CMS. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The use of the Bayesian approach in the formation of the student's competence in the ICT direction by Seisenbekova, Perizat, Shayakhmetova, Asem, Othman, Mohamed

    Published 2019
    “…The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…This optimizes data transmission, enhances energy efficiency, and extends network longevity. The ACO algorithm integrates multiple criteria, ensuring routes are short and energy-efficient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Registration and billing system by Chin Yong, Tan

    Published 2005
    “…To over come these problems,a Registration and Billing System Prototype have been developed.The format of the system prototype is a web-based application.The purpose of this development is to solve the existing problems found in the existing system.A software development process called Rapid Software Development Life Cycle(RSDLC) has been used to develop this system prototype.The purpose of using this software development process is to shorten the time for the software development process.The tools of the software development are Macromedia Dreamweaver MX 6.0; the JSP web dynamic programming language and Oracle 9i as the system database.The Registration and Billing System Prototype uses an integrated system database to store the patient data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Constraint preserving mapping algorithm for XML storage by Ahmad, Kamsuriah, Mamat, Ali, Ibrahim, Hamidah, Mohd Noah, Shahrul Azman

    Published 2006
    “…The use of XML as the common format for representing, exchanging, storing, integrating and accessing data poses many new challenges to database systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…Furthermore, discussion about the hardware methods of implementing communication protocols shows a way for the engineer to choose the right method for his future development of the protocols for implementation. Finally, this algorithmic approach is proposed to integrate this approach to simulate the methodology of IP to WATM conversion.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage by Ektefa, Mohammadreza

    Published 2011
    “…One of the principal challenges in integrating databases is duplication. In other words, in different databases, one entity may be available in different formats. …”
    Get full text
    Thesis
  17. 17

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement by Ab Jabal, Mohamad Faizal, Rozlan, Muhammad Irfan, Suhaimi, Azrina, Hasmy, Harshida

    Published 2025
    “…The proposed algorithmic refinements integrate chromatic and morphological attributes, particularly surface area and optimise logical operators to enhance accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Prevention of Textual Plagiarism Application by Mohd Nor, Nor Atikah

    Published 2011
    “…This form of plagiarism can be categorized as a form of direct stealing without proper acknowledgment and consent of another's work. Rabin - Karp Algorithm which is a string searching algorithm that uses hashing to compare the strings will be integrated in this project as well. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…Problem statement: The use of XML as the common formats for representing, exchanging, storing, integrating and accessing data posses many new challenges to database systems. …”
    Get full text
    Get full text
    Journal