Search Results - (( development authority selection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- authority selection »
- selection algorithm »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
AGENT MEETING SCHEDULER
Published 2011“…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. …”
Get full text
Get full text
Final Year Project -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
Autonomous Robot Navigation in Unknown Maze Environment
Published 2012“…The objective of this project is to design and develop an autonomous robot navigation using a selected algorithm which is pledge algorithm by using the concept of obstacle avoidance besides studying its accuracy to solve the given environment. …”
Get full text
Get full text
Final Year Project -
6
Development of genetic algorithm-based fuzzy rules design for metal cutting data selection
Published 2002“…The authors have developed fuzzy models for machinability data selection (Int. …”
Get full text
Get full text
Get full text
Article -
7
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
8
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
9
-
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
12
Development of lecturers' publication score algorithm / Zamali Tarmudi and Haijon Gunggut
Published 2016“…The aim of this paper is to develop a lecturers' publication score algorithm to assist UiTM Sabah in selecting winners among lecturers in terms of publication contribution. …”
Get full text
Get full text
Article -
13
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. …”
Conference paper -
14
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…This research process serves as a blueprint for developing advanced technical solutions that aid authorities and healthcare professionals in optimal resource management during emergency situations.…”
Get full text
Get full text
Thesis -
15
Development Of Water Quality Index Prediction Model For Penang Rivers Using Artificial Neural Network
Published 2021“…To achieve those objectives, there were three main phases implemented in the network development framework; first, the determination of feature extraction using multiway principal component analysis (MPCA), second, the ANN model development and architecture selection for BOD and COD analysis, and third, the ANN architecture selection for WQI prediction model. …”
Get full text
Get full text
Monograph -
16
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
17
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients
Published 2019“…Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The data transformed into cognitive maps to supply the data warehouse. …”
Get full text
Get full text
Thesis -
20
