Search Results - (( java implementation phase algorithm ) OR ( basic using drops algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Group consumers' preference recommendation algorithm model for online apparel's colour based on Kansei engineering by Ge, Baoru, Shaari, Nazlina, Mohd Yunos, Mohd Yazid, Zainal Abidin, Sazrinee

    Published 2023
    “…Thus, this study took the colour design of men's plain-colour shirts as an example in China, established the basic colour calculation scale and an algorithm model of group consumers' product preferences based on Kansei Engineering and scientific mathematics, to provide new sales ideas and methods for retailers and markets online. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network by Derrick Qin Sheng, Wong

    Published 2025
    “…In this thesis, the study focuses on the performance of the enhanced roaming algorithm in Extended Service Set (ESS) network, which consists of multiple Basic Service Set (BSS) network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    High Viscous Fluid Transport Model by Tan, Ming Chai

    Published 2004
    “…A solution algorithm was built to solve for the mathematical model. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    INVESTIGATION ON THE CUTTING PARTICLES TRANSPORT IN HORIZONTAL WELL DRILLING by ELTAHIR ELTILIB, RAWIA ABD ELGADIR

    Published 2010
    “…Accordingly, the simulations demonstrated that the basic model could be used to analyze the cuttings transport. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network by Che-Aron, Zamree, Mohammed Al-Khateeb, Wajdi Fawzi, Anwar, Farhat

    Published 2010
    “…We design and implement a backup route algorithm by creating a backup path for every node in the network. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…Computer networks are becoming increasingly important to the delivery of modern society's basic services. As a result of this growing dependence, traffic and users worldwide have also grown. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis