Search Results - (( developing world process algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Complex-valued nonlinear adaptive filters for noncircular signals by Cyprian, Amadi Chukwuemena

    Published 2017
    “…The augmented CNGD has shown low Means Square Error (MSE) capabilities and have optimal performance than the conventional algorithm. To this end, a supervised complex adaptive algorithm convex combination complex nonlinear gradient descent (CC-CNGD) is developed to address the capabilities of processing the generality of complex signals (both circular and non-circular) and systems in either a noisy or a noise-free environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Process Sequencing Modeled as TSP with Precedence Constraints - A Genetic Algorithm Approach by N. M., Razali

    Published 2014
    “…In this study a new genetic algorithm (GA) procedure is developed which includes chromosome’s repairing strategy based topological sort to handle the precedence constraints and to generate only feasible solution during the evolutionary process. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. The algorithm converts the model to coding, structures the process of entering data, automates the calculations and presents the results in a well-organized and suitable interfaces for the team managerial review purposes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    System setup on jetson nano for smart crowd covid monitoring system by Muhammad Othman, Maliki

    Published 2022
    “…While this algorithm was accurate, it required too much processing power to run on the Jetson Nano in its current form. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…Thus, numerous studies have been conducted to utilize HS in real-world optimization problems, and many variants and hybrid algorithms of HS have been developed to cope with different problems. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. The proposed algorithm is capable of processing the generality of quaternion and complex data signals in both noisy and noise-free environments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    On determination of input parameters of the mass transfer process by fuzzy approach. by Maan, Normah, Talib, Jamalludin, Arshad, Khairil Annuar, Ahmad, Tahir

    Published 2005
    “…Hence, an inverse model describing the process in obtaining the solution of the problem is developed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Implementation and Optimization of Human Tracking System Using ARM Embedded Platform by Teoh, Shen Khang, Yap, Vooi Voon, Soh, Chit Siang, Sebastian , Patrick

    Published 2012
    “…Computer vision is a field that includes methods for acquiring, processing, analyzing and understanding images. In the embedded world, computer vision applications have to fight with limited processing power and limited resources to achieve optimized algorithms and high performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
    Get full text
    Get full text
    Thesis