Search Results - (( developing formative selection algorithm ) OR ( java identification using algorithm ))

Refine Results
  1. 1

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…The system is organized into two combined components: weight calculation for each player to estimate their strength and simulation for suitable formation when facing opponents. Then, the system will select the appropriate players to be placed in the specified formation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm by Golshan, Abolfazl

    Published 2013
    “…With the optimal parameter sets, an operator can select a suitable combination of variables to obtain a better surface finish or lower burr formation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
    Get full text
    Get full text
    Article
  10. 10

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…It evaluates system formation methods, hierarchical structures, and leader selection criteria, comparing various parameters to identify factors influencing node formation and routing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm by Zainudin, Azlan

    Published 2018
    “…Primarily, this research is about the optimization of triaxial ceramic employing the POFA process by the Taguchi design and Flower Pollination Algorithm (FPA). The recycled POFA was evaluated through the POFA layer formation method where selected POFA layers were employed as filler raw material. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Regression test case prioritisation (TCP) is used to revalidate modified software, ensuring its quality before release on the digital market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An enhanced feature selection technique for classification of group-based holy quran verses by Oyekunle, Adeleke Abdullahi

    Published 2018
    “…In the experiment, six feature selection algorithms were applied: In.formation Gain (JG), Chi-square (CH), Pearson Correlation Coefficient (PCC), RelieJF, Correlation-based (CFS), and the proposed JG-CFS algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…An enhanced Bucket Brigade Algorithm (BBA) is developed to avoid the problem of choosing classifiers with high strength value but with incorrect behaviour. …”
    Get full text
    Get full text
    Thesis
  20. 20