Search Results - (( java implementation during algorithm ) OR ( using competency based algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Academic leadership bio-inspired classification model using negative selection algorithm by Jantan, Hamidah, Sa’dan, Siti ‘Aisyah, Che Azemi, Nur Hamizah Syafiqah

    Published 2015
    “…Managing employee’s competency is considered as the top challenge for human resource professional especially in the process to determine the right person for the right job that is based on their competency.As an alternative approach, this article attempts to propose academic leadership bio-inspired classification model using negative selection algorithm to handle this issue.This study consists of three phases; data preparation, model development and model analysis. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…Recently, the swarm-based hybrid algorithms have given significant performance in cancer classification. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Competing risks for reliability analysis using Cox’s model by Mohamed Elfaki, Faiz Ahmed, Daud, Isa, Ibrahim, Nor Azowa, Abdullah, M. Y., Usman, Mustofa

    Published 2007
    “…This paper seeks to show that, with a large sample size based on expectation maximization (EM) algorithm, both models give similar results. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm by Yifan, Bai, Kamarudin, Khairul Manami, Alli, Hassan

    Published 2024
    “…This research explores the Pareto-primarily based Genetic Algorithm (PGA) inside this framework, with the goal of fostering innovation in product layout and the generation of novel ideas. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Fuzzy adaptive emperor penguin optimizer for global optimization problems by Md Abdul, Kader

    Published 2023
    “…The Emperor Penguin Optimizer (EPO) is a recently developed population-based metaheuristic algorithm that simulates the huddling behaviour of emperor penguins. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Determination of the best single imputation algorithm for missing rainfall data treatment by Gamil Abdulraqeb Abdullah Saeed, Chuan, Zun Liang, Roslinazairimah Zakaria, Wan Nur Syahidah Wan Yusoff, Mohd Zuki Salleh

    Published 2016
    “…The presence of missing rainfall data is inevitable due to error of recording, meteorological extremes and malfunction of instruments. Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Determination of the Best Single Imputation Algorithm for Missing Rainfall Data Treatment by Saeed, Gamil Abdulraqeb Abdullah, Chuan, Zun Liang, Roslinazairimah, Zakaria, Wan Nur Syahidah, Wan Yusoff

    Published 2016
    “…The presence of missing rainfall data is inevitable due to error of recording, meteorological extremes and malfunction of instruments. Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling by Anuar, Nurul Izah

    Published 2022
    “…It is also discovered that the hybrid-discrete MOPSO (HD-MOPSO) algorithm manages to obtain higher values in the performance metrics consisting of non-dominance ratio and hypervolume compared to the competing algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Latin hypercube sampling Jaya algorithm based strategy for T-way test suite generation by Nasser, Abdullah B., Abdul-Qawy, Antar S. H., Abdullah, Nibras, Hujainah, Fadhl, Kamal Z., Zamli, Ghanem, Waheed A. H. M.

    Published 2020
    “…Jaya Algorithm (JA) is a new metaheuristic algorithm, has been used for solving different problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A novel clustering algorithm for mobile ad hoc networks based on determination of virtual links’ weight to increase network stability by Karimi, Abbas, Afsharfarnia, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2014
    “…In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Cutpoint determination methods in competing risks subdistribution model by Noor Akma Ibrahim, Abdul Kudus, Isa Daud, Mohd. Rizam Abu Bakar

    Published 2009
    “…Five cutpoint determination methods are developed based on regression of competing risks subdistribution. …”
    Get full text
    Get full text
    Article