Search Results - (( developing using three algorithm ) OR ( java application among algorithm ))
Search alternatives:
- application among »
- developing using »
- java application »
- three algorithm »
- among algorithm »
-
1
-
2
-
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
5
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
7
-
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
Get full text
Get full text
Article -
9
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Research Report -
10
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
11
Network monopoly / Tan Kean Yeap
Published 2002“…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
12
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
Get full text
Get full text
Thesis -
13
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
14
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
15
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…In addition, a software package using Matlab for 2D and 3D path planning has also been developed. …”
Get full text
Get full text
Thesis -
18
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
19
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Hence, this complicated structure and operation will affect the capability of SAPFs to work efficiently.Therefore, this work proposes three soft-computing algorithms for generating reference currents, and controlling current and voltage of a three-phase three-leg three-wire SAPF. …”
Get full text
Get full text
Thesis -
20
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…Given the NP-Hard nature of the three models proposed in this thesis, two metaheuristic algorithms have been developed. …”
Get full text
Get full text
Get full text
Thesis
