Search Results - (( developing nation methods algorithm ) OR ( java application force algorithm ))

Refine Results
  1. 1

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  2. 2

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  3. 3

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Sentiment analysis on national cultural tourism using Linear Support Vector Machine (LSVM) / Nur Haida Hanna Samsuddin by Samsuddin, Nur Haida Hanna

    Published 2020
    “…In future, it is recommended to experiment with different algorithm or kernel of Support Vector Machine. The volume of data should be large as it can generate better result of classification method.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A novel computer-aided multivariate water quality index by Siong, Fong Sim, Teck, Yee Ling, Seng, Lau, Mohd Zuli, Jaafar

    Published 2015
    “…Unlike other conventional indexing methods, the algorithm calculates the index in a multivariate manner. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Development of Sense and Avoid system based on multi sensor integration for unmanned vehicle system by Legowo, Ari, Ramli, M. Faiz, Syafiq Shamsudin, Syariful

    Published 2016
    “…Subsequently, once the algorithms are put together, including maneuvers avoidance technique algorithm, the developed SAA system will be experimentally tested in order to validate and evaluate the overall capability of the system.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14
  15. 15

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Raw fingerprint images and filtered images (noise removal and enhancement) are tested to determine the efficiency of the algorithm developed. The improved algorithm has applied to 350 image samples obtained from National Institute of Standards and Technology (NIST). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Investigation of load variant under power distribution network reconfiguration using EPSO algorithm by Sulaima, Mohamad Fani, Wong, Kok Loong, Bohari, Zul Hasrizal, Mohd Nasir, Mohamad Na'im

    Published 2024
    “…Furthermore, the test result also indicated that the EPSO algorithm produced better results in terms of convergence time compared to the conventional PSO algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm by Nur Azulia, Kamarudin

    Published 2019
    “…Therefore, in this study SUREAutometrics is improvised using two MLE methods, which are iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm, named as SURE(IFGLS)-Autometrics and SURE(EM)-Autometrics algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development of an integrated scheduling model for handling equipment in automated port container terminals by Sadeghian, Syed Hamidreza

    Published 2014
    “…To evaluate the performance of the developed model and solving method, numerical experiments are designed and the obtained results are reported and analyzed in this research. …”
    Get full text
    Get full text
    Thesis
  20. 20