Search Results - (( java implementation new algorithm ) OR ( (parameter OR parameters) program case algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMAL DESIGN OF A BLDC MOTOR BY GENETIC ALGORITHM by OTHMAN, AZRUL HISHAM

    Published 2007
    “…The design and analysis of the motor are performed using software tools within the C/C++ programming environment. The optimal design parameters of the motor obtained by GA are compared with those obtained by SA technique. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Hybrid fuzzy-sliding mode observer design for estimation and advanced control of an ethylene polymerization process / Jarinah Mohd Ali by Jarinah , Mohd Ali

    Published 2017
    “…The first case is the known initial state without constraint, which is the ideal case for study or more likely for programming validation purposes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi by Seyedmehdi, Mirmohammadsadeghi

    Published 2015
    “…For solving TTRP, a variety of algorithms have been applied earlier but TTRPSD programming has not yet solved. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale by Ameenuddin Irfan, S., Fadhli, M.Z., Padmanabhan, E.

    Published 2021
    “…The study aims to investigate the effect of both parameter, TOC, and mineralogy on the shale wettability with a case study of Malaysian shale sample. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Fitting time-varying coefficients SEIRD model to Covid-19 cases in Malaysia by Zulkarnain, Norsyahidah, Abdul Hadi, Muhammad Salihi, Mohammad, Nurul Farahain, Shogar, Ibrahim

    Published 2023
    “…Several optimization algorithms under Python’s LMfit package, such as Levenberg-Marquardt, Nelder-Mead, Trust-Region Reflective and Sequential Linear Squares Programming; are employed to estimate the related parameters, in such that the numerical solution of the ODEs will fit the data with the slightest error. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  12. 12

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…The main advantage of this algorithm is that no algorithm-particular controlling parameters are required for this algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Performance of hybrid GANN in comparison with other standalone models on dengue outbreak prediction by Husin, Nor Azura, Mustapha, Norwati, Sulaiman, Md. Nasir, Yaacob, Razali, Hamdan, Hazlina, Hussin, Masnida

    Published 2016
    “…Early prediction of diseases especially dengue fever in the case of Malaysia, is very crucial to enable health authorities to develop response strategies and context preventive intervention programs such as awareness campaigns for the high risk population before an outbreak occurs. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of least square adjustment application for traversing / Harith Fadhillah Soeb by Soeb, Harith Fadhillah

    Published 2019
    “…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Combinatorial Black Hole Algorithm: A Metaheuristic Approach for Combinatorial Testing by Ibrahim, Izrulfizal Saufihamizal, Ibrahim, Rosziati, Mat Rejab, Mazidah

    Published 2023
    “…The effectiveness of this approach is demonstrated through experiments on a series of real-world computer programs. The findings indicate that the method is feasible in identifying defects with fewer test cases and in less time needed compared to the current technology in CT techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Combinatorial Black Hole Algorithm: A Metaheuristic Approach for Combinatorial Testing by Ibrahim, Izrulfizal Saufihamizal, Ibrahim, Rosziati, Mat Rejab, Mazidah

    Published 2023
    “…The effectiveness of this approach is demonstrated through experiments on a series of real-world computer programs. The findings indicate that the method is feasible in identifying defects with fewer test cases and in less time needed compared to the current technology in CT techniques. …”
    Get full text
    Get full text
    Get full text
    Article