Search Results - (( developing interactive function algorithm ) OR ( java validation system algorithm ))
Search alternatives:
- developing interactive »
- function algorithm »
- validation system »
- system algorithm »
- java validation »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The proposed embedded system has achieved positive outcomes in comparison to the current system and the traditional algorithm with regards to the shortest path. …”
Get full text
Get full text
Thesis -
4
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…Hence, a novel humanmachine interaction is developed in the proposed approach. …”
Get full text
Get full text
Thesis -
5
Metadata network visualizer
Published 2009“…The present invention is developed by firstly, developing and using an algorithm to automatically extract publication metadata, secondly, developing and utilizing a more interactive and networked visualizer to display the publication metadata, with more extensive navigational functionalities and finally by providing the option to save the metadata to a database so that search function can be executed. …”
Get full text
Patent -
6
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
7
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The phase in RAD such as planning requirements, user design, rapid construction and cutover is used during development. RAD highlights on user interaction and quick development of the system using prototypes. …”
Get full text
Get full text
Thesis -
8
Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function
Published 2019“…However, the evaluation function used in the AI is developed based on historical traffic data. …”
Get full text
Get full text
Get full text
Thesis -
9
Decentralized Adaptive Pi With Adaptive Interaction Algorithm Of Wastewater Treatment Plant
Published 2014“…The Pi controller parameters are obtained by using simple updating algorithm developed based on adaptive interaction theory. …”
Get full text
Get full text
Get full text
Article -
10
T-way testing : a test case generator based on melody search algorithm
Published 2015“…This thesis is research on developing a T-Way Testing : A Test Case Generator Based On Melody Search Algorithm (TTT-MS) to generate optimum final test list. …”
Get full text
Get full text
Undergraduates Project Papers -
11
User to user topic recommendation model for student social interaction
Published 2025“…This predictive analytics model compared single and multi-classifier accuracy in predicting the importance of a topic for an individual. Then, a newly developed algorithm called the Social Recommendation (SAR) algorithm ranked and recommended the best topic for social interaction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
14
Computer control of batch process plant (software development)
Published 1995“…The optimums PID parameters obtain arc being expected to be implement on the computer control of batch process plant software based on the real-time Proportional, Integral and Derivative (PID) algorithms. The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
Get full text
Get full text
Student Project -
15
A FUZZY LOGIC ALGORITHM FOR HEART RATE MONITORING
Published 2014Get full text
Get full text
Final Year Project -
16
Visualisation tool to study malaria transmission using network modelling
Published 2014“…The output from this visualisation tool shows predicted hotspots which harbour the infected malaria vectors. This output was validated with UCINET 6.0 as the benchmark system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
-
18
Interactive Fuzzy Logic Interface for Enhanced Real-Time Water Quality Index Monitoring
Published 2026journal::journal article -
19
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…This project software development process used an agile model SDLC to develop the system. …”
Get full text
Get full text
Thesis -
20
Development of finite element model for soil-structure interaction
Published 2014“…In order to develop an efficient ANN system, the required algorithm is built through trial and error procedure and then through this process feed-forward network with back-propagation training function is implemented. …”
Get full text
Get full text
Thesis
