Search Results - (( development methodology utilization algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…The methodology focusing on simplicity and fast development process that suitable for simple and small project in a short time. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi, Zain Ali, Noohul Basheer

    Published 2010
    “…The proposed methodology could be used to quickly port a CPUbased algorithm for a quick gain in performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA) by Mohd Nazlee, Anas, Hussin, Fawnizu Azmadi, Zain Ali, Noohul Basheer

    Published 2010
    “…The proposed methodology could be used to quickly port a CPUbased algorithm for a quick gain in performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Application of response surface methodology coupled with genetic algorithm in the optimization of cutting conditions for surface roughness in end-milling of Inconel 718 using coate... by Ishtiyaq, M. H., Amin, A. K. M. Nurul, Karim, A.N. Mustafizul, Ginta, Turnad Lenggo, Patwari, Muhammed Anayet Ullah

    Published 2007
    “…This paper presents an efficient method of optimisation of surface roughness in end milling of Inconel 718 using TiAlN coated inserts under dry conditions by coupling response surface methodology (RSM) with genetic algorithm (GA). RSM has been utilized to develop an efficient mathematical model for surface roughness in terms of cutting parameters. …”
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Estimation of photovoltaic models using an enhanced Henry gas solubility optimization algorithm with first-order adaptive damping Berndt-Hall-Hall-Hausman method by Ramachandran, Murugan, Sundaram, Arunachalam, Ridha, Hussein Mohammed, Mirjalili, Seyedali

    Published 2024
    “…The existing literature extensively explores the utilization of powerful Metaheuristic Algorithms (MAs) to address the complex constrained optimization problem in PV systems and achieve optimal solutions. …”
    Get full text
    Get full text
    Article
  10. 10

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Musical instrument identification using Convolutional Neural Network (CNN) algorithm / Muhammad Nur Azri Irfan Abdul Rahman by Abdul Rahman, Muhammad Nur Azri Irfan

    Published 2025
    “…In the development phase, Convolutional Neural Network model was designed and trained using sophisticated techniques of data augmentation, dropping out and hyperparameter tuning under the supervised learning methodology to increase the performance of the system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Alternative method for economic dispatch utilizing grey wolf optimizer by Wong, Lo Ing

    Published 2015
    “…Although several optimization methodologies have been developed for solving ED problems, the complexity of the task reveals the necessity for development of efficient algorithms to accurately locate the optimum solution. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model by Ouwabunmi, Babalola AbdulHafeez

    Published 2025
    “…This study presents the development and evaluation of a novel hybrid machine learning algorithm that integrates the strengths of Random Forest and Gradient Boosting models to enhance the prediction of smORFs. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multiobjective evolutionary algorithms NSGA-II and NSGA-III for software product lines testing optimization by Jamil, Muhammad Abid, Alhindi, Ahmad, Arif, Muhammad, Nour, Mohamed K, Awang Abu Bakar, Normi Sham, Aljabri, Tareq Fahad

    Published 2020
    “…Software Product line (SPL) engineering methodology utilizes reusable components to generate a new system for a specific domain. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Bus scheduling algorithm for UiTM Shah Alam / Muhd Hisyam Nursalam Ahmad Pauzi by Ahmad Pauzi, Muhd Hisyam Nursalam

    Published 2017
    “…In realizing this project, Waterfall Methodology Software Development is utilize in managing the project.lt is a methodology which focus on the quality of the requirement and design which is the most suitable for this project that emphasize on the accuracy of time. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The methodology is proposed as stacking ensemble ML and the best ML algorithms are used as a base learner to compute relative feature weights. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments by Haque, Najmul, Zafril Rizal, M. Azmi, Murad, Saydul Akbar

    Published 2026
    “…An essential element of cloud computing is effective job scheduling, which optimizes resource utilization and minimizes operational costs. Numerous scheduling methodologies have been developed, each targeting specific performance objectives such as reducing makespan, minimizing flow time, decreasing deadline violations, and optimizing resource utilization. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Determining rural development priority using approach hybrid clustering methodologies: a case south Sulawesi-Indonesia by Muhammad, Faisal, T.K.A, Rahman

    Published 2023
    “…To determine recommendations for the required field of expertise in each village, the cosine similarity algorithm is employed. Villages classified within the CSLI-poor cluster are considered development priorities. …”
    Get full text
    Get full text
    Journal