Search Results - (( developing nation systems algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun by Wan Harun, Wan Muhammad Aqil

    Published 2016
    “…The developed proposed system is named Colosseum Tournament Management System (CTMS). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Reference-point modified honey badger algorithm: Intelligent optimization for off-grid photovoltaic system / Nur Atharah Kamarzaman ... [et al.] by Kamarzaman, Nur Atharah, Sulaiman, Shahril Irwan, Yassin, Ahmad Ihsan, Zainuddin, Hedzlin, Ibrahim, Intan Rahayu

    Published 2024
    “…Furthermore, this aligns with the United Nations Sustainable Development Goal (SDG) 7, which aims to ensure access to affordable, reliable, sustainable, and modern energy for all.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…This issues can solved by programming the Congkak system based on previous work on Mancala and NN system, and then recording the performance of the related algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm by Lee, Clement Yuon Sien

    Published 2016
    “…The profile is test on IEEE bus-30 system. The results showed that the developed charging strategy achieved the required battery capacity and has reduced peak load and improved load factor thus reduces impacts on power system networks.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    Development of Sense and Avoid system based on multi sensor integration for unmanned vehicle system by Legowo, Ari, Ramli, M. Faiz, Syafiq Shamsudin, Syariful

    Published 2016
    “…Subsequently, once the algorithms are put together, including maneuvers avoidance technique algorithm, the developed SAA system will be experimentally tested in order to validate and evaluate the overall capability of the system.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Human rights in the digital era : challenges and opportunities from the United Nations human rights system by Iza, Daniela González

    Published 2021
    “…The main objective of this paper is to analyze the way the non-conventional and conventional mechanisms of the United Nations Human Rights System have treated this issue. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…Forensic laboratories analyze firearm-related evidence utilizing established ballistic identification systems such as the Integrated Ballistic Identification System (IBIS), Advanced Ballistics Analysis System (ALIAS), EVOFINDER Automated Ballistic Identification System, and CONDOR Ballistic Identification System. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  12. 12

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…To prevent such kinds of deadly scenarios, a reliable fall detection system must be developed to help many lives. In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16
  17. 17

    A WEB-BASED SYSTEM FOR THE PREDICTION OF STUDENT PERFORMANCE IN UPCOMING PUBLIC EXAMS BASED ON ACADEMIC RECORDS by DELLON, NELSON BRUNNIE

    Published 2023
    “…Public exam systems which are a type of structured examination systems are implemented nationwide at institutions in nations that place a high value on education. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…Therefore, this article proposes a decision aid model to be utilized in realizing an adaptive emergency evacuation centre management system. This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
    Get full text
    Get full text
    Get full text
    Article