Search Results - (( developing organizations design algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- developing organizations »
- organizations design »
- implication force »
- design algorithm »
- java implication »
- force algorithm »
-
1
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…The algorithm enables tournament organizer to pairs players that can ensure excitement to the viewer and players. …”
Get full text
Get full text
Thesis -
2
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. …”
Get full text
Get full text
Thesis -
3
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…The development of block cipher have resulted in a number of cryptographic algorithms such as FOX, BC2, HIGHT, KLEIN, KAMFEE, KAMKAR, ARIA, BLOWFISH256, DESL, REBC2, DSDP, 3D-AES and many more. …”
Article -
4
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The phase in RAD such as planning requirements, user design, rapid construction and cutover is used during development. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Evolutionary genetic algorithm as a generative tools in identifying Malay, Chinese and Indian cultural product DNA / Izzuddinazwan Misri
Published 2015“…R.T (2007) and these inform the development of a theoretical for assisting new design DNA transformation. …”
Get full text
Get full text
Thesis -
8
Redundancy allocation for a high security control system using estimation of distribution algorithm
Published 2012Get full text
Working Paper -
9
-
10
Developing stereo vision system for object recognition and positioning of AMAD-R mobile robot
Published 2009Get full text
Working Paper -
11
-
12
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
13
An application of image processing for automated mixed household waste sorting system
Published 2012Get full text
Working Paper -
14
Organizational Culture Automated Audit System (OCAAS)
Published 2017“…Several state of the art technologies and techniques were used to design and developed OCAAS which include the use of machine learning and sentiment analysis based novel opinion mining algorithms for electronic opinion analysis and computerized statistics based mathematical algorithms for electronic data analysis as well as MySQL database integration for faster data processing and cognitive ergonomics system interface for user friendly interface navigation.…”
Get full text
Get full text
Get full text
Thesis -
15
Development of Low Cost Heart Rate Monitoring Device and Classification Technique Using Fuzzy Logics Algorithm
Published 2016Get full text
Get full text
Final Year Project -
16
Image quality assessment using Elman neural network model
Published 2012Get full text
Working Paper -
17
Recent trends in channel assignment algorithms for multi-radio multi-channel in Wireless Mesh Network
Published 2019“…The issues regarding capabilities of multi-radio multi-channel (MRMC) has been extensively studied to design an efficient algorithm for WMN. Channel assignment and various techniques have been designed and developed to improve the network performance of MRMC. …”
Get full text
Get full text
Get full text
Article -
18
Design of an intelligent robotic donationbox a case study
Published 2011“…The developed IRDB system has the capability of collecting donation from people in an organized assembly or gathering. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Moving vehicle identification using artificial neural network
Published 2012Get full text
Working Paper -
20
An Ant Colony System for Solving DNA Sequence Design Problem in DNA Computing
Published 2013Get full text
Article
