Search Results - (( how implementing software algorithm ) OR ( java data optimization algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  3. 3

    Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed by Mohamed, Mohamad Zuhairy

    Published 2008
    “…However for this project the repetitive controller just implement to the SIMULINK software. From the SIMULINK software the each repetitive controller represent each block diagram as a virtual hardware. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Accelerating graph algorithms with priority queue processor by Heng Sun, Ch'ng, Eik Wee, Chew, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…Assuming embedded hardware-software codesign, results show that our priority queue processor performs better than software implementation, and the run-time complexity of DijkstraÂ’s algorithm is reduced from O(n lg n) in software implementation to O(n) with our priority queue processor.…”
    Get full text
    Get full text
    Article
  5. 5

    Trend analysis of software engineering scientific publications by Tengku Nadzirah, Tengku Majani

    Published 2019
    “…The implementation of the algorithm will help the users to see the trends and recognize patterns in Software Engineering scientific publications in future. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    PID control system implementation in embedded system for DC motor speed control by Ariff, Che Mohd Noor

    Published 2008
    “…Three experiments have been done to look how much PID control algorithms affect the performances on driving actual DC motor; P1 algorithm experiment, PD algorithm experiment and PID algorithm experiment. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    EasyA: Easy and effective way to generate pairwise test data by Rabbi, Khandakar Fazley, Sabira, Khatun, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2013
    “…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi by Mohd Rafi, Hafifi

    Published 2012
    “…This algorithm will be implemented on the Xilinx ISE 12.4 software to model the sequence and optimize the last sequence of DNA. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi by Rozi, Muhammad Faris Fakhri, Ismail, Alya Syuhada, Suhaimi, Emylia

    Published 2018
    “…This project was developed into a Graphical User Interface (GUI) using MAPLE software to show how the system works. It was believed that this implementation has increased the level of secrecy in the sharing session using the method applied. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    The behaviours of convergents in θ-expansions: computational insights based on θ-expansions algorithm using the maple software by Muhammad, K. N., Kamarulhaili, H., Asbullah, M. A., Sapar, S. H.

    Published 2024
    “…The idea of discovering the behaviours of θ-convergent evolved from the concept of regular continued fraction (RCF) expansion and sequences involved in θ-expansions. The θ-expansions algorithm was used to compute the values of θ-convergent with the help of Maple software. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Error performance in BCH codes / Zurina Mohamed by Mohamed, Zurina

    Published 2003
    “…The theoretical part covers the algorithms used, how they are encoded and decoded and how they are used to correct errors. …”
    Get full text
    Get full text
    Thesis
  20. 20