Search Results - (( developing visual basic algorithm ) OR ( java data optimization algorithm ))
Search alternatives:
- developing visual »
- data optimization »
- basic algorithm »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
3
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…Therefore, Visual C++ is expected to achieve a higher processing speed than Visual Basic. …”
Get full text
Get full text
Get full text
Article -
4
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…A user friendly GUI is developed using VISUAL BASIC to interface the user commands with the Robot controller. …”
Get full text
Get full text
Monograph -
5
Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators
Published 2023“…The movement and the configurations of the manipulators at the task points were visualized using a simulator developed via Visual Basic. …”
Conference paper -
6
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
8
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
10
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
12
Performance Study of Developed SMART EYE for Visually Impaired Person.
Published 2013Get full text
Get full text
Article -
13
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
14
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…The purpose of this research is to detect the rust in oil tanks by localizing visual inspection technology using UAVs, as well as to develop algorithms to distinguish between defects and noise. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
A secure message handler using microsoft cryptoapi
Published 2003“…A Visual Basic module called clsCiyptoAPI was developed to make calls to the advapi32.dll where the functions for the CryptoAPI reside. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A secure message handler using microsoft cryptoapi
Published 2003“…A Visual Basic module called clsCiyptoAPI was developed to make calls to the advapi32.dll where the functions for the CryptoAPI reside. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
19
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
Get full text
Get full text
Thesis -
20
Exploratory Study on Navigation System for Visually Impaired Person
Published 2013Get full text
Get full text
Article
