Search Results - (( developing imperative optimization algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems by Mohd Helmi, Suid

    Published 2024
    “…The empirical assessment of these proposed methods encompasses a diverse set of 23 benchmark functions, demonstrating their efficacy comparable to well-established metaheuristic algorithms such as as the Grey Wolf Optimizer (GWO), Multi-Verse Optimization (MVO), Sine Cosine Algorithm (SCA), Ant Lion Optimizer (ALO), Moth-Flame Optimization Algorithm (MFO), and Grasshopper Optimization Algorithm (GOA). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Characterization of PV panel and global optimization of its model parameters using genetic algorithm by Ismail M.S., Moghavvemi M., Mahlia T.M.I.

    Published 2023
    “…This paper details an improved modeling technique for a photovoltaic (PV) module; utilizing the optimization ability of a genetic algorithm, with different parameters of the PV module being computed via this approach. …”
    Article
  4. 4
  5. 5

    Characterization of PV panel and global optimization of its model parameters using genetic algorithm by Ismail, M.S., Moghavvemi, Mahmoud, Mahlia, T.M.I.

    Published 2013
    “…This paper details an improved modeling technique for a photovoltaic (PV) module; utilizing the optimization ability of a genetic algorithm, with different parameters of the PV module being computed via this approach. …”
    Get full text
    Get full text
    Article
  6. 6

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…Consequently, assessing and confirming the significance of packets (data) before its synchronization with cloud storage becomes imperative. The major contribution of this work lies in the develop of Prior Evaluation Cloud Storage Cost Optimization called (PECSCO) mechanism to optimize the cloud cost with least overhead. …”
    Conference paper
  7. 7

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…We considered the drawbacks and advantage various algorithms and concluded that Greedy algorithm is comparatively better than other algorithms regarding the optimal solution.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Navigating challenges and opportunities of machine learning in hydrogen catalysis and production processes: Beyond algorithm development by Salehmin M.N.I., Tiong S.K., Mohamed H., Umar D.A., Yu K.L., Ong H.C., Nomanbhay S., Lim S.S.

    Published 2025
    “…Hence, this comprehensive review delves into the technical, practical, and ethical considerations associated with the application of ML in HER catalyst development and HPP optimization. Overall, this review provides guidance for unlocking the transformative potential of ML in enhancing prediction efficiency and sustainability in the hydrogen production sector. ? …”
    Review
  9. 9

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancement of Single and Composite Images Based on Contourlet Transform Approach by Melkamu, Hunegnaw Asmare

    Published 2009
    “…Image enhancement is an imperative step in almost every image processing algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia by Lay, Usman Salihu

    Published 2019
    “…The general objective of the study was the development of optimized hybrid debris flow models using airborne laser scanning data and Machine learning algorithms in Malaysia. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Bouc-Wen model parameter identification for a new magneto-rheologigal fluid damper using particle swarm optimization by Mohd Azraai, Mohd Razman

    Published 2014
    “…The objectives are succinct in three main criteria starting with the development of MR fluid damper, then a representation of hysteresis model and lastly optimizing these parameters by inducing PSO algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis