Search Results - (( developing inventory based algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1
  2. 2

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…Further more, an improved non-dominated sorting genetic algorithm with an elite strategy II (IMNSGA-II) has been developed to solve the two bi-objective models, surpassing existing literature’s algorithms such as Pareto Envelope-based Selection Algorithm II (PESA-II) and NSGA-II. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of integrated models for distribution network design of perishable products by Firoozi, Zahra

    Published 2015
    “…Therefore, the third phase of this research develops a much efficient solution method based on Lagrangian relaxation to solve the integrated inventory-location model for fixedlifetime perishable products. …”
    Get full text
    Get full text
    Thesis
  4. 4

    The framework of inventory prediction model using ABC analysis for inventory management / Umi Safierah Masdiki and Rozita Kadar by Masdiki, Umi Safierah, Kadar, Rozita

    Published 2024
    “…Utilizing the CRISP-DM model as a framework, this study applies ABC analysis in the development of the prediction model. The choice of algorithm for this study will be based on selecting the best algorithm for model development proposal. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Developing an app for streamlined inventory tracking with barcode scanning and load planning optimization by Teng, Yan Xin

    Published 2025
    “…Keywords: Inventory Management, Barcode Scanning, Load Planning, Binary Tree Bin Packing Algorithm, Mobile Application Development. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Distribution network design for fixed lifetime perishable products: a model and solution approach by Firoozi, Zahra, Ismail, Napsiah, Ariafar, Shahram, Tang, Sai Hong, Mohd Ariffin, Mohd Khairol Anuar, Memariani, Azizollah

    Published 2013
    “…To solve the model, an efficient Lagrangian relaxation heuristic algorithm is developed. The model and algorithm are validated by sensitivity analysis on some key parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Inventory tracker with estimation by Beh, Wei Jun

    Published 2024
    “…Key features include inventory tracking, estimation algorithms based on historical data, and integration with communication tools like WhatsApp for seamless order management. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The locations of landslides were detected accurately by employing two Machine learning classifiers, namely, SVM and RF, decision rule and hierarchal rules sets were developed by applying decision tree (DT) algorithm to provide improved landslide inventory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC by Merrad, Yacine, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Gunawan, Teddy Surya

    Published 2020
    “…It is also used in our daily life applications, especially in developing and enhancing business management. Inventory or stock management is one of these applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Metaheuristic algorithms for solving lot-sizing and scheduling problems in single and multi-plant environments / Maryam Mohammadi by Mohammadi, Maryam

    Published 2015
    “…Metaheuristic approaches namely genetic algorithm, particle swarm optimization, artificial bee colony, simulated annealing, and imperialist competitive algorithm are adopted for the optimization procedures. …”
    Get full text
    Get full text
    Thesis