Search Results - (( developing formative term algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing formative »
- validation using »
- java validation »
- using algorithm »
- term algorithm »
-
1
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
2
A Comparative Study on Compression of Different Image File Formats
Published 1999“…From the study, it can be concluded that LZW algorithm is better than RLE algorithm in term of percentage compression. …”
Get full text
Get full text
Thesis -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
Throughput enhancement in cognitive radio network via coalition formation using matching theory
Published 2015“…Index Terms—cognitive radio; spectrum sensing; distributed algorithms; stable matching, matching theory.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
6
Coalition formation for throughput enhancement via one-sided matching theory
Published 2016“…We prove that the proposed algorithm leads to stable coalition formation in the cognitive radio network and show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to the non-cooperative scenario…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Coalition formation for throughput enhancement via one-sided matching theory
Published 2016“…We prove that the proposed algorithm leads to stable coalition formation in the cognitive radio network and show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to the non-cooperative scenario.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
10
A New Cell Formation Method Considering Operation Sequences And Production Volumes
Published 2013“…This research, presents an algorithm for cell formation to minimize intercellular movements. …”
Get full text
Get full text
Thesis -
11
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Therefore, by the aim of this project is to facilitate and solve the problem by developed FitwithTrainer android application with auto-formation group chat for clients and trainers along with rule-based expert system for classification of trainer in term of trainer’s levels and specialties in website system. …”
Get full text
Get full text
Student Project -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
14
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
15
Registration and billing system
Published 2005“…To over come these problems,a Registration and Billing System Prototype have been developed.The format of the system prototype is a web-based application.The purpose of this development is to solve the existing problems found in the existing system.A software development process called Rapid Software Development Life Cycle(RSDLC) has been used to develop this system prototype.The purpose of using this software development process is to shorten the time for the software development process.The tools of the software development are Macromedia Dreamweaver MX 6.0; the JSP web dynamic programming language and Oracle 9i as the system database.The Registration and Billing System Prototype uses an integrated system database to store the patient data. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
17
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
18
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
19
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…At the algorithmic level, several approaches for solving the pose estimation problem are compared in terms of their neural implementability. …”
Get full text
Get full text
Thesis -
20
Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change
Published 2014“…The statistics of climate change variation and the growth of evolution method inspire the development of a sustainable and long term reservoir operation system. …”
Get full text
Get full text
Thesis
