Search Results - (( development programme tree algorithm ) OR ( java application among algorithm ))
Search alternatives:
- application among »
- java application »
- among algorithm »
- programme tree »
- tree algorithm »
-
1
-
2
Logic modeling and mathematical model in developing a tree species selection prototype
Published 2014“…Logic modeling and mathematical model can aid system analysts, system developers and programmers to construct a system during a system development process. …”
Get full text
Get full text
Get full text
Article -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
5
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
7
-
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
Get full text
Get full text
Article -
9
-
10
Beyond Grades - Predicting Programme Learning Outcomes with Multi-Output Regression in Malaysian Higher Education
Published 2025journal-article -
11
Optimal load management strategy for enhanced time of use (ETOU) electricity tariff in Peninsular Malaysia / Mohamad Fani Sulaima
Published 2020“…A novel method was developed by integrating a modified energy audit procedure with decision tree technique to determine the percentage of controlled loads available for LM, and the optimal LM weightage. …”
Get full text
Get full text
Thesis -
12
Classification of water quality using artificial neural network
Published 2020“…Deterioration in water quality has triggered many countries to initiate serious mitigation efforts because it is essential to prevent and control water quality pollution and to implement regular monitoring programmes to preserve the environment. Hence, the water quality index (WQI) developed by Department of Environment (DOE) Malaysia has been used to classify water quality in Malaysia for the past few decades. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
14
Network monopoly / Tan Kean Yeap
Published 2002“…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
15
-
16
Ensemble learning for multidimensional poverty classification
Published 2020“…In addition, the United Nation Development Programme (UNDP) has introduced a set of multi-dimensional poverty measurements but is yet to be applied in the case of Malaysia. …”
Get full text
Get full text
Get full text
Article -
17
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
20
