Search Results - (( developing future constructions algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…There are six steps of genetic algorithm. The prototype is useful to worker in construction calculate the total number of parking spaces in the future.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…After generating the future climate parameters, the predicted stream flow by ANN and estimated future evaporation (convert future minimum and maximum temperature generated by LARS-WG into future evaporation by penman formula) are exported to the constructed models to predict the future power generation output. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Underwater Wireless Sensor Networks: Routing Issues and Future Challenges by Muhammad, Ayaz, Azween, Abdullah

    Published 2009
    “…In addition, at the end we will give some future directions, which can be helpful in order to construct the algorithms for such environments.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Supplier selection for contractors using Fuzzy TOPSIS Algorithm / Mohamed Shafiq Mohamed Yusof by Mohamed Yusof, Mohamed Shafiq

    Published 2020
    “…Fuzzy TOPSIS has been proven to be one of the best methods in decision making and ranking as it has been widely used in many fields (Kacprzak, 2018). The future work of this project is to develop a system by using the same domain but with different algorithm and compare the result with the current result obtained from the system…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM by Carey, Ling Yu Fan

    Published 2023
    “…To investigate and capture the development of the pandemic, mapper algorithm can be used to visualize and analyse the COVID data set provided by the government. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…It will need the development of trade-off algorithms to analyze value of technical solution in real time. …”
    Get full text
    Get full text
    Article
  17. 17

    Adapting robot kinematics for human-arm motion recognition by Chan, C.S., Liu, H., Brown, D.

    Published 2007
    “…This paper presents a novel method to the analysis of human-arm motion, in particular improving the efficiency of conventional motion recognition algorithms. Contrary to the prior art methods, this research develops a framework for human-arm motion recognition where qualitative normalised templates (QNTs) is proposed to replace the conventional approaches. …”
    Get full text
    Get full text
    Article
  18. 18

    An Orchestrated Survey on T-Way Test Case Generation Strategies Based on Optimization Algorithms by Alsewari, Abdulrahman A., Kamal Z., Zamli

    Published 2014
    “…Due to the market needed for diverse types of tests, recently, several number of t-way testing strategies (where t indicates the interaction strengths) have been developed adopting different approaches Algebraic, Pure computational, and Optimization Algorithms (OpA). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19
  20. 20