Search Results - (( development plan evaluation algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting by Md Salleh N.S., Suliman A., Jorgensen B.N.

    Published 2023
    “…Forecasting; Investments; Machine learning; Development investment; Energy prediction; Evaluation metrics; Long term planning; Machine learning methods; Metric evaluation; Resource planning; Systematic literature review; Learning algorithms…”
    Conference Paper
  4. 4

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…The treatment plans were then recalculated using Pencil Beam algorithm and similar TCP, NTCP and isotoxic effects were evaluated. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Five (5) Alternative Algorithm Design Techniques (AADTs) were developed and investigated for suitability in providing process planning solutions suitable for reconfigurable manufacturing. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots by Wan Daud, Wan Mohd Bukhari, Abu, Nur Syuhadah, Omar, Siti Nashayu, Sohaimeh, Shahirul Ashraf, Adli,, M. H.

    Published 2022
    “…The following review analyses and compares 200 articles from two databases, Scopus and IEEE Xplore, and selects 60 articles as references from those articles. This evaluation focuses mostly on the accuracy of the different path-planning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun by Wan Harun, Wan Muhammad Aqil

    Published 2016
    “…The project implements Rapid Application Development (RAD) methodology. There are a total of 5 phases in RAD, initial planning, requirement planning, user design, construction and cutover. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani by Ab Ghani, Nur Laila

    Published 2015
    “…An accurate urban expansion map helps town planners in planning land use allocation and identifying potential land area to be developed…”
    Get full text
    Get full text
    Thesis
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A discrete simulated kalman filter optimizer for combinatorial optimization problems by Suhazri Amrin, Rahmad

    Published 2022
    “…In this research, three combinatorial problems namely the travelling salesman problem (TSP), assembly sequence planning (ASP), and the hole drilling proble are used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    MYMealPal: Malaysian healthy meal planner using artificial bee colony approach / Wan Muhamad Amirul Hakimi Wan Mohd Zaki by Wan Mohd Zaki, Wan Muhamad Amirul Hakimi

    Published 2017
    “…ABC algorithm will evaluate every meal calories in the database to find the best meal plan with the optimal calories for user. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…Finally, a novel Reactive Power Planning R.PP) algorithm using the state-of-the-art of EP for voltage stability improvement was developed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    AUTOMATED GUIDED ROBOT (AGR) by Abd Rahim, Mohd Azlan Shah

    Published 2007
    “…The paper describes the network algorithms developed and used in the design process of the AGR including simulations and circuit designs done for the prototype. …”
    Get full text
    Get full text
    Final Year Project