Search Results - (( java implementation during algorithm ) OR ( using levels using algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA) by Odeh, Ali Ahmad Alabd Abu

    Published 2012
    “…The results revealed that Multi-level Wavelet Transform Algorithm (MWTA) can be used in more than one level in this algorithm but the efficiency of this algorithm for compressing was found to be in the first level in terms of size.…”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed by Mudasir , Ahmed

    Published 2019
    “…The asynchronous particle swarm optimization (APSO)-newton raphson (NR) is proposed for low-level inverters, and APSO-genetic algorithm (GA) is proposed for high-level inverters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…The focus of this research is on the enhancement of the scalar arithmetic level by designing and analysing an inexpensive {0, 1, 3}-NAF scalar recoding algorithm in an effort to maintain the Hamming weight for the based algorithm and reduce the algorithm complexity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm by Salami, Momoh Jimoh Eyiomika, Tijani, Ismaila, Isqeel , Abdullateef Ayodele, Aibinu, Abiodun Musa

    Published 2013
    “…The proposed algorithm involves a two level optimization scheme to search for both optimal network architecture and weights. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Automated Model Generation Algorithm for High Level Fault Modeling by Xia, Likun, Bell, Ian, Wilkinson, Antony

    Published 2010
    “…Furthermore, high level fault modeling (HLFM) has been shown to work reasonably well using manually designed fault models. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Dual level searching approach for solving multi objective optimisation problems using hybrid particle swarm optimisation and bats echolocation-inspired algorithms by Nafrizuan, Mat Yahya, A. R., Yusoff, Azlyna, Senawi, Tokhi, M. Osman

    Published 2019
    “…A dual level searching approach for multi objective optimisation problems using particle swarm optimisation and modified adaptive bats sonar algorithm is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…For future work, the algorithm will be extended to identify the semantic level strategies, diagnose the strategies used and provide constructive feedback.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Low and high level hybridization of ant colony system and genetic algorithm for job scheduling in grid computing by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2015
    “…Hybrid metaheuristic algorithms have the ability to produce better solution than stand-alone approach and no algorithm could be concluded as the best algorithm for scheduling algorithm or in general, for combinatorial problems.This study presents the low and high level hybridization of ant colony system and genetic algorithm in solving the job scheduling in grid computing.Two hybrid algorithms namely ACS(GA) as a low level and ACS+GA as a high level are proposed.The proposed algorithms were evaluated using static benchmarks problems known as expected time to compute model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Hybrid firely and particle swarm optimisation algorithm for optimal dimming level and energy saving in lecturer’s room by Nik Ahmad, Nik Sahidah

    Published 2022
    “…In order to identify the optimal dimming level, energy consumption, simulation time and luminaire performance, this research work presents the comparison between light-emitting diode (LED) and fluorescent luminaires using the HFPSO algorithm and using the particle swarm optimisation (PSO) algorithm and the firefly algorithm (FA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…This is because elliptic curve cryptosystem uses smaller key size than RSA but it provides equivalent security level with the RSA. …”
    Get full text
    Get full text
    Thesis