Search Results - (( developing rational methods algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Rational methods for solving first order ordinary differential equation by Fairuz, A'in Nazifa

    Published 2019
    “…On the other hand, the methods from the second class are all A-stable. Besides that, the algorithm for the proposed methods are developed with constant step size strategy, in which the strategy to compute the starting values by an existing methods is also included. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Designing of skull defect implants using C1 rational cubic Bezier and offset curves by Najihah, Mohamed, Ahmad, Abd Majid, Abd Rahni, Mt Piah, Zainul, Ahmad Rajion

    Published 2015
    “…The main objective of our study is to develop a simple method to redesign missing parts of the skull. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli by Ramli, Nazirah

    Published 2003
    “…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
    Get full text
    Get full text
    Book Section
  8. 8

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Miller’s algorithm for computing the Tate pairing, originally used the binary chains with corresponding point doubling operation in evaluating the rational function. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Composite slab numerical strength test method under partial connection approach by Mohammed, Kachalla, Abd. Karim, Izian, Abd. Aziz, Farah Nora Aznieta

    Published 2017
    “…Hence, a procedural algorithm lead to the development of PCS determination function using longitudinal shear estimation method by considering section slenderness and deck characteristics. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Inversion algorithm of fiber bragg grating for nanofluid flooding monitoring by Yahya, N., Nyuk, C.M., Ismail, A.F., Hussain, N., Rostami, A., Ismail, A., Ganeson, M., Ali, A.M.

    Published 2020
    “…This technique is a promising method in rational magnetophoresis toward fluid mobility via fiber Bragg grating (FBG). …”
    Get full text
    Get full text
    Article
  13. 13

    New Sequential and Parallel Division Free Methods for Determinant of Matrices by Sharmila, Karim

    Published 2013
    “…The computation times in the newly developed sequential methods were dominated by generating starter sets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…DASC-FS integrates the Adaptive Sine Cosine Algorithm (ASCA) as a search algorithm to determine the relevant features and adopts Depth Linear Discriminant Analysis (D-LDA) to identify the discriminative features that maximize class sepa ration. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16
  17. 17

    Numerical Analysis of Defects Caused by Thermolysis in an Infinite Cylindrical Ceramic Moulding by Gumel, A. B., Twizell, E. H.

    Published 1999
    “…The concentration profile at a given time is computed by replacing the matrix exponential terms in this recurrence relation by a high-order Pade approximate. A parallel algorithm using two processors is developed by taking the partial fraction decomposition of the Pade approximate and a (matrix) rational expression in the recurrence relation.…”
    Get full text
    Get full text
    Article
  18. 18

    Automatic diagnosis of diabetic retinopathy from fundus images using digital signal and image processing techniques by Aibinu, Abiodun Musa, Iqbal, Muhammad Imran, Nilsson, Mikael, Salami, Momoh Jimoh Emiyoka

    Published 2007
    “…Segmentation stage clusters the image into two distinct classes while the abnormalities detection stage was used to distinguish between candidate lesions and other information. Methods of diagnosis of red spots, bleeding and detection of vein-artery crossover points have also been developed in this work using the color information, shape, size, object length to breadth ration as contained in the acquired digital fundus image. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Optimised multi-robot path planning via smooth trajectory generation by Loke, Zhi Yu

    Published 2024
    “…Particle swarm optimization (PSO) outperforms conventional methods like artificial potential fields (APF), the Dijkstra algorithm, and the A* algorithm in path planning for mobile robots. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis