Search Results - (( developing special function algorithm ) OR ( java implementation best algorithm ))

Refine Results
  1. 1

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…I will be concentrating on finding the best algorithm for calculating the shortest distance between two points on a digital map. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A hybrid SP-QPSO algorithm with parameter free adaptive penalty method for constrained global optimization problems by Fatemeh, D. B., Loo, C. K., Kanagaraj, G., Ponnambalam, S. G.

    Published 2018
    “…Most real-life optimization problems involve constraints which require a specialized mechanism to deal with them. The presence of constraints imposes additional challenges to the researchers motivated towards the development of new algorithm with efficient constraint handling mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Since the encryption and decryption algorithm of a new cryptosystem is based on the defined Lucas function, it is believed that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…The numerical solution of RDDE is then extended for solving the neutral delay differential equations (NDDE) of non-discontinuity and discontinuity cases. A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17

    Alternative method for economic dispatch utilizing grey wolf optimizer by Wong, Lo Ing

    Published 2015
    “…Although several optimization methodologies have been developed for solving ED problems, the complexity of the task reveals the necessity for development of efficient algorithms to accurately locate the optimum solution. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method by Hasan, Nurul

    Published 2010
    “…The proposed architecture is more scalable and proposed algorithm is robustness against even/uneven node deployment.…”
    Get full text
    Get full text
    Citation Index Journal
  19. 19

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Therefore tests can be conducted as you develop the system. From tests, it was observed that all functions perfectly, accurately, and swiftly, indicating the advantages of an E-Certificate system.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph