Search Results - (( development programmes modified algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…This parallel programme is further modified using a generalized Hejhal’s algorithm to cater for fundamental domain that has several cusps namely the principal congruence subgroup of level two. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Malay Chatterbot by Lokman, Aina Fatiha

    Published 2005
    “…AIML is open source software, a great advantage for the project since the software can be freely used and, if necessary, modified. The simplicity of AIML makes it easy for non-programmers, especially those who already knowHTML, to get started writing chat robots.…”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Runtime pluggable CPU scheduler for linux operating system by Al-Maweri, Nasr Addin Ahmed Salem

    Published 2010
    “…It also provides a flexible interface for kernel developers which facilitates the evaluation and testing for their newly developed scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Nonlinear three-dimensional finite elements for composite concrete beams by Kohnehpooshi, Omid

    Published 2012
    “…Therefore in this study, new interface elements have been developed,while modified constitutive law have been applied and new computational algorithm is utilised. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. This scalar multiplication algorithm is named Q-NAF scalar multiplication for binary curve over Lopez-Dahab coordinates. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimal load management strategy for enhanced time of use (ETOU) electricity tariff in Peninsular Malaysia / Mohamad Fani Sulaima by Sulaima, Mohamad Fani

    Published 2020
    “…A novel method was developed by integrating a modified energy audit procedure with decision tree technique to determine the percentage of controlled loads available for LM, and the optimal LM weightage. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article