Search Results - (( java application customization algorithm ) OR ( construct validity modified algorithm ))
Search alternatives:
- customization algorithm »
- construct validity »
- java application »
-
1
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017Get full text
Get full text
Monograph -
2
-
3
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…The model employs a two-level structure, where the first level uses standard soft constraints as the objective function to evaluate solution quality, while the second level dynamically adapts to faculty-specific preferences. A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. The framework was subsequently verified and validated through expert reviews and experimental testing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Wastewater treatment process: a modified model for oxidation pond
Published 2021“…The model has been solved numerically by using the 4th order Runge-Kutta method and a parameter fitting technique namely Nelder-Mead simplex algorithm embedded in MATLAB software. To validate the result, a comparison between the model and the experimental data was carried out and measured by using the root mean squared error (RMSE). …”
Get full text
Get full text
Thesis -
6
New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani
Published 2021“…Therefore, this study applied a new modified shooting method which is Sufahani-Ahmad-Newton-Golden-Royalty Algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Adaptive hybrid fuzzy-proportional plus crisp-integral current control algorithm for shunt active power filter operation
Published 2016“…The effectiveness of the proposed CCA in regulating supply current is validated in both simulation and experimental work. …”
Get full text
Get full text
Article -
9
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…Risks are inherently present In all construction projects. Quite often, construction projects fail to achieve their time quality and budget goals. …”
Get full text
Get full text
Thesis -
10
The accuracy of the gas-kinetic BGK finite difference method for solving 3-D compressible inviscid flows
Published 2011“…The underlying numerical scheme for the solver was based on the collisional Boltzmann model that produces the gas-kinetic BGK (Bhatnagaar-Gross-Krook) scheme. In constructing the desired algorithm, the convection flux terms were discretized by a semi-discrete finite difference method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Model predictive current and reactive power control for multilevel four-leg indirect matrix converter / Hazrul Mohamed Basri
Published 2019“…The predictive algorithm computes the one-step prediction load current and reactive power. …”
Get full text
Get full text
Get full text
Thesis -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
