Search Results - (( java implementation during algorithm ) OR ( using competency based algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- using competency »
- competency based »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
4
Academic leadership bio-inspired classification model using negative selection algorithm
Published 2015“…Managing employee’s competency is considered as the top challenge for human resource professional especially in the process to determine the right person for the right job that is based on their competency.As an alternative approach, this article attempts to propose academic leadership bio-inspired classification model using negative selection algorithm to handle this issue.This study consists of three phases; data preparation, model development and model analysis. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Recently, the swarm-based hybrid algorithms have given significant performance in cancer classification. …”
Get full text
Get full text
Get full text
Article -
6
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Competing risks for reliability analysis using Cox’s model
Published 2007“…This paper seeks to show that, with a large sample size based on expectation maximization (EM) algorithm, both models give similar results. …”
Get full text
Get full text
Get full text
Article -
9
Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm
Published 2024“…This research explores the Pareto-primarily based Genetic Algorithm (PGA) inside this framework, with the goal of fostering innovation in product layout and the generation of novel ideas. …”
Get full text
Get full text
Get full text
Article -
10
Fuzzy adaptive emperor penguin optimizer for global optimization problems
Published 2023“…The Emperor Penguin Optimizer (EPO) is a recently developed population-based metaheuristic algorithm that simulates the huddling behaviour of emperor penguins. …”
Get full text
Get full text
Thesis -
11
Statistical process control for failure crushing time data using competing risks model
Published 2011“…EM algorithm method is used to estimate the parameter of the model. …”
Get full text
Get full text
Get full text
Article -
12
Statistical process control for failure crushing time data using competing risks model.
Published 2011“…EM algorithm method is used to estimate the parameter of the model. …”
Get full text
Get full text
Get full text
Article -
13
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
14
Determination of the best single imputation algorithm for missing rainfall data treatment
Published 2016“…The presence of missing rainfall data is inevitable due to error of recording, meteorological extremes and malfunction of instruments. Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
Get full text
Get full text
Get full text
Article -
15
Determination of the Best Single Imputation Algorithm for Missing Rainfall Data Treatment
Published 2016“…The presence of missing rainfall data is inevitable due to error of recording, meteorological extremes and malfunction of instruments. Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
Get full text
Get full text
Get full text
Article -
16
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
17
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…It is also discovered that the hybrid-discrete MOPSO (HD-MOPSO) algorithm manages to obtain higher values in the performance metrics consisting of non-dominance ratio and hypervolume compared to the competing algorithms. …”
Get full text
Get full text
Get full text
Thesis -
18
Latin hypercube sampling Jaya algorithm based strategy for T-way test suite generation
Published 2020“…Jaya Algorithm (JA) is a new metaheuristic algorithm, has been used for solving different problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A novel clustering algorithm for mobile ad hoc networks based on determination of virtual links’ weight to increase network stability
Published 2014“…In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. …”
Get full text
Get full text
Get full text
Article -
20
Cutpoint determination methods in competing risks subdistribution model
Published 2009“…Five cutpoint determination methods are developed based on regression of competing risks subdistribution. …”
Get full text
Get full text
Article
