Search Results - (( developing policy evolution algorithm ) OR ( java implementation plan algorithm ))
Search alternatives:
- evolution algorithm »
- java implementation »
- implementation plan »
- developing policy »
- plan algorithm »
-
1
Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia
Published 2024“…Principle component analysis was used to determine which predictors were most reliable. Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. …”
Article -
2
A web-based implementation of k-means algorithms
Published 2022“…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The development of this project is based on a framework of 5 main stages: planning, analysis, design, implementation and testing. …”
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
Get full text
Get full text
Thesis -
5
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
6
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
8
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. Methodologies used in this system are based on system analysis and design methodology comprising planning, analysis, design and implementation. …”
Get full text
Get full text
Final Year Project -
9
Proposed algorithm for scheduling in computational grid using backfilling and optimization techniques
Published 2016“…To allocate the suitable resources for the incoming jobs, a scheduling algorithm has to manage this process.In this paper, we provide a critical review the recent mechanisms in “grid computing” environment.In addition, we propose a new scheduling algorithm to minimize the delay for the end user, Gap Filling policy will be applied to improve the performance of the priority algorithm.Then, an optimization algorithm will perform in order to further enhance the initial result for that obtained from backfilling mechanism.The main aim of the proposed scheduling mechanism is to improve the QoS for the end user in a real grid computing environment.…”
Get full text
Get full text
Get full text
Article -
10
Agro-ento bioinformation: towards the edge of reality
Published 2002“…The protocols range from the molecular levels to domains of larger dimensions such as those encompassing fraternities of politics and policies, and societal applications. These protocols, algorithms, and visualisations undergo dynamic incubation processes to produce the end product, which is bioinformation. …”
Get full text
Get full text
Inaugural Lecture -
11
Conclusion
Published 2019“…The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Smart student timetable planner
Published 2025“…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Autonomous formation flight control of multiple UAVs with motion capture system
Published 2013“…If the leader were nonfunctional, the whole system will be nonfunctional. There is no policy of algorithm were by the leader's task can be pass to other quad-rotor UAV. …”
Get full text
Get full text
Thesis -
14
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
15
