Search Results - (( developing interactive computing algorithm ) OR ( based application need algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Orchestrated Survey on T-Way Test Case Generation Strategies Based on Optimization Algorithms by Alsewari, Abdulrahman A., Kamal Z., Zamli

    Published 2014
    “…Due to the market needed for diverse types of tests, recently, several number of t-way testing strategies (where t indicates the interaction strengths) have been developed adopting different approaches Algebraic, Pure computational, and Optimization Algorithms (OpA). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Thus far, a few efficient interactive mining algorithms have been proposed. However, their runtime do not fulfill the need of short runtime in real time applications especially where data is sparse and proper frequent patterns are mined with very low values of minsup. …”
    Get full text
    Get full text
    Thesis
  8. 8

    3D character reconstruction from 2D orthogonal images by Kok, Yung Thow

    Published 2025
    “…The proposed algorithm is organized into modular stages, allowing artists and developers to further improving the pipeline by integrating computer vision, AI models and 3D modelling and scripting techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…IoT study fields currently involve security and privacy due to the fact that the installation of Cryptographic Internet Communications "ICs" for protected IC applications like Fog Computing and Cloud Computing devices is extremely crucial in any developing technology. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of location-inventory model based on all-unit quantity discount policy by Firoozi, Zahra

    Published 2011
    “…To investigate the performance of the developed heuristic algorithms, results of the heuristics in terms of total cost and computational time (CPU time) are compared with results obtained by enumeration algorithm and results obtained by Lingo 12.0 software. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…To this end, we have developed an incremental learning approach using soft-computing techniques to learn opponent’s preferences in multi-issue negotiation with incomplete information. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18

    Wireless data gloves Malay sign language recognition system by Tan, Tian Swee, Ariff, Ahmad Kamarul, Shaikh Salleh, Sheikh Hussain, Siew, Kean Seng, Leong, Seng Huat

    Published 2007
    “…This paper describes the structure and algorithm of the whole Wireless Bluetooth Data Gloves Sign Language Recognition System, which is defined as a Human-Computer Interaction (HCI) system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A hybrid unsupervised approach toward EEG epileptic spikes detection by Khosropanah, Pegah, Ramli, Abdul Rahman, Abbasi, Mohammad Reza, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…The results show the efficiency of this algorithm in detecting epileptic spikes using low-resolution EEG with least computational complexity, highest sensitivity, and lesser human interaction compared to similar studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The category of networking would serves to be a small foundation from which to base the future scenario of other reliable multicast and real time web based gaming system.…”
    Get full text
    Get full text
    Thesis