Search Results - (( integer implementation control algorithm ) OR ( java data integration algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Approximation techniques by Bingi, K., Ibrahim, R., Karsiti, M.N., Hassan, S.M., Harindran, V.R.

    Published 2020
    “…This chapter will focus on practical realization or equivalent circuit implementation of the fractional-order systems and controllers in a finite-dimensional integer-order system. …”
    Get full text
    Get full text
    Article
  2. 2

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…In addition, the strategy of control mechanism was applied in hybrid algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Thesis
  4. 4

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A study on the significance of backlash width values to the performance of the MIQP-based design of MPC by H., Zabiri, Y., Samyudia

    Published 2005
    “…An approach that has been recently developed involved the integration of the actuator backlash within the framework of Model Predictive Control (MPC) controller algorithm itself. This method, so-called the Mixed-Integer Quadratic Programming (MIQP)-based design of MPC, has been shown through extensive simulation on industrial case studies to be able to handle efficiently actuator saturation and actuator backlash nonlinearities simultaneously. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Following site identification, an improved Geographical Information System-driven fuzzy Traveling Salesman Problem-Binary Integer Programming algorithm was proposed to integrate these sites into a reliable ring-based system topology, aiming to achieve a zero-carbon footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Nested repetitive structure techniques in examination seating number allocation process at UiTM Pulau Pinang branch / Jamal Othman, Rozita Kadar and Naemah Abdul Wahab by Othman, Jamal, Kadar, Rozita, Abdul Wahab, Naemah

    Published 2020
    “…To automate the process of assigning the seating numbers, an algorithm was designed and constructed using the nested repetitive or looping structure techniques with JAVA programming language. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…The theory of chaos provides the means to explain the phenomenon of chaos, control chaotic dynamic systems, and use the properties of chaos. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise