Search Results - (( developing knowledge integration algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- knowledge integration »
- integration algorithm »
- implementation during »
- java implementation »
- during algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…These proves that without prior knowledge, the hybrid AI algorithm can self-learn. …”
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
4
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…The algorithm is developed by integrating the SURE model with the Autometrics search strategy; hence, it is named as SURE-Autometrics. …”
Get full text
Get full text
Get full text
Thesis -
6
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
A Mobile Application For Stock Price Prediction
Published 2021“…A mobile application for stock price prediction using time series algorithms is developed to tackle the problem mentioned. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
10
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
11
Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg
Published 2006“…This research presents the integration of ontology and metabolic pathway prediction algorithm as a possible solution for predicting metabolic pathways. …”
Get full text
Get full text
Thesis -
12
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
13
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
14
-
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…The inspired honeybee’s behavior was designed based on the integration of knowledge of charging station, remaining energy and environment with static and dynamic obstacles. …”
Get full text
Get full text
Thesis -
18
Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm
Published 2019“…This reduces the number of training samples by 16.1%, validation samples by 14.7% and neural model development time by 23%. Besides that, the use of the prior knowledge input neural network (PKI-ANN) and the prior knowledge input difference neural network (PKID-ANN) for the modeling of high dimensional SI problem is proposed. …”
Get full text
Get full text
Thesis -
19
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…This proved the developed navigation algorithm not only satisfied its objective but also has reliability in its performance.…”
Get full text
Get full text
Thesis -
20
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis
